Digital Forensics Tool: Volatility Memory Forensics Framework

Digital Forensics Tool: Volatility Memory Forensics Framework

Digital Forensics Tool: Volatility Memory Forensics Framework Reading Time: 3 Minutes   Digital Forensics Tool: Volatility Memory Forensics Framework Github Link   The Volatility Framework by Aaron Walters, is a completely open collection of tools, implemented in...
Offensive Security Tool: lsassy

Offensive Security Tool: lsassy

Offensive Security Tool: lsassy Reading Time: 4 Minutes   Offensive Security Tool: lsassy Github Link   The way Windows is designed, when it stores passwords, it uses lsass.exe, which is the Local Security Authority Subsystem Service. So, when you go to your...
Offensive Security Tool: BeeF Framework

Offensive Security Tool: BeeF Framework

Offensive Security Tool: BeeF Framework Reading Time: 4 minutes   Offensive Security Tool: BeeF Framework Github Link   When hackers gain access to an internal network, it does not mean they got what they want, shell is just the beginning, with a series of...
Reconnaissance Tool: shhgit

Reconnaissance Tool: shhgit

Reconnaissance Tool: shhgit Reading Time: 4 minutes   Reconnaissance Tool: sshgit Github Link   Shhgit by eth0izzle, finds secrets and sensitive files across GitHub code and Gists committed in near real time by listening to the GitHub Events API. Finding secrets...
Digital Forensic Tool: Steganography Toolkits

Digital Forensic Tool: Steganography Toolkits

Digital Forensic Tool: Steganography Toolkits Reading Time: 4 minutes     Digital Forensic Tool: Steganography Toolkits Github Link   Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video. This...
OSINT Reconnaissance Tool: trape

OSINT Reconnaissance Tool: trape

OSINT Reconnaissance Tool: trape Reading Time: 4 minutes     OSINT Reconnaissance Tool: trape Github Link Trape by Jose Pino is an OSINT analysis and research tool, which allows people to track and execute intelligent social engineering attacks in real time. It was...