ThreatPinch Lookup
ThreatPinch Lookup creates informational tooltips when hovering oven an item of interest on any website. It helps speed up security investigations by automatically providing relevant information upon...
View ArticleBuscador Investigative Operating System
Buscador is a Linux Virtual Machine that is pre-configured for online investigators.
View ArticleCerbero Profiler
Cerbero Profiler is a tool designed primarily for malware and forensic analysis. It supports a huge number of file formats (listed below) on which it performs analysis and lets the user inspect their...
View ArticleDROID (Digital Record and Object Identification)
More information can be found on the DROID github pages here: http://digital-preservation.github.com/droid/ DROID is a software tool developed by The National Archives to perform automated batch...
View Articlenccgroup Forensic Fuzzing Tools
This is a collection of scripts that can be used to generate fuzzed files, fuzzed file systems, and file systems containing fuzzed files. These can be used to test the robustness of forensics tools and...
View ArticleinVtero.net
A high speed (Gbps) Forensics, Memory integrity & assurance. Includes offensive & defensive memory capabilities. Find/Extract processes, hypervisors (including nested) in memory dumps using...
View ArticleLe.tools.com ExtractFace
Investigators, researchers or other analysts often have to get local copies of Facebook data. It can be necessary for a lot of reasons like submitting Facebook data as evidence, doing advanced offline...
View ArticleLe.tools.com ConvertShellcode
ConvertShellcode takes Shellcode as input and disassemble it in a list of instructions in assembly language.
View ArticleLe-tools.com XL-Whois
XL-Whois is a tool to make multiple advanced whois requests; It supports Domain Whois, Network Whois and DNS Records; Object for the requests are parsed from the clipboard content so time to prepare...
View ArticleLe-tools.com XL-Tools
XL-Tools provides a bunch of functions for list of strings, grouped in five categories : Category Functions Lists No duplicate, Only duplicates, Count items, Count characters, L1-L2, Column to row, Row...
View ArticleLe-tools.com XL-FileTools
XL-FileTools provides a bunch of functions for files, grouped in three categories: Category Functions List There are two types:- List of files produces a tab of informations about files that can...
View ArticleStegosaurus
Stegosaurus is a steganography tool that is used for embedding payloads within Python byte code. The process does not modify the runtime performance or file size of the carrier file and typically...
View ArticleFAME
FAME is an open source malware analysis platform that is meant to facilitate analysis of malware-related files, leveraging as much knowledge as possible in order to speed up and automate end-to-end...
View ArticleSteganoG
Steganog stores sensitive data of all kinds in a bitmap file so that the image remains unchanged. Powerful compression and adjustable image quality also allow the storage of relatively large amounts of...
View ArticleKuniper Forensics XT_RAW
XT_RAW is an X-Tension for X-Ways Forensics which is able to detect (by extension, by header) and convert RAW-images made by modern cameras. Detection by Extension3FR, ARI, ARW, BAY, CAP, CINE, CR2,...
View ArticleSpiderFoot
SpiderFoot is an open source intelligence automation tool. Its goal is to automate the process of gathering intelligence about a given target. Purpose There are three main areas where SpiderFoot can be...
View ArticleMISP - Malware Information Sharing Platform & Threat Sharing - Training...
In 2016 and 2017, CIRCL gave multiple practical trainings of MISP(Malware Information Sharing Platform & Threat Sharing). The purpose was to reach out the security analysts using MISP as a...
View ArticleMySQL Forensic Tool for TeamServer
Want database metrics from your TeamServer installation? Great! This project will build a runnable jar that will allow you to log core metric data from your MySQL database whether it is local or...
View ArticleBSides San Francisco CTF 2017 : ximage-300
Every one of these images contains the same hidden message. What's it say? Hint: it starts with 'FLAG:'! Hint2: - The name is meaningful. What else can 'x' mean? - Each individual image is enough to...
View Article