Maresware Upcopy
Upcopy works a lot like ROBOCOPY and XCOPY except that is has many more options. And because it is a command line tool, it allows you to literally program its operation.Category: MareswareCategory URL:...
View ArticleMaresware Url_Srch
The URL_SRCH program is designed to search files and produce a fixed length output record which contains the filename, location in the file, surrounding text, and the item itself. It can search for IP...
View ArticleMaresware Verticle
This program takes tab delimeted records in files like those exported from X-Ways export list and converts each record field to a seperate line by itself. Easier to import into a report rather than a...
View ArticleMaresware X-Ways Metadata
The X-Ways exported metadata fields are actually a field which itself contains semi-colon (;) delimited fields. These fields are the individual items extracted from within the various files' metadata....
View ArticleMaresware Filbreak
Filbreak will allow you to select sections of an input record and put them into an output record of a different format. You select fields of the input record, rearrange them, then write them to a new...
View ArticleMaresware Filsplit
Filsplit allows you to copy a section of records from an input file and place them to an output file. You can select: a chunk of records from within the file; a random sample of every ‘n’th record; or...
View ArticleMaresware Findrecl
Anyone who works with mainframe data knows that there is usually no record delimeter (i.e., carriage return/line feed). That makes working with these files on a PC difficult. Findrecl simplifies the...
View ArticleMaresware Ispgp
Ispgp can search either an entire disk or just specified directories for files that are PGP related files. PGP related files include: PGP encrypted files; PGP keyrings (secret and public); PGP...
View ArticleMaresware Kiting
Kiting will take a fixed length record and analyze two fields containing dates. It calculates the difference of two date fields and then appends to the record a 5 digit number representing the...
View ArticleMaresware Lfn_Crc
When long filenames are deleted in Windows, there remain remnants of the 8.3 filename in the directory. When undeleting the long filename it must match the original exactly; otherwise, an internal...
View Articlecircl.lu Digital Forensic - Training Materials
Disk Image: disk image SHA1:e5ffc7233adb32979835d5743a16457e53b9f783 Category: More Images!Category URL: http://www.dfir.training/component/mtree/test-images-and-challenges/more-images?Itemid=
View ArticleEmber: An Open Source Classifier And Dataset
Over the last decade, machine learning has achieved truly impressive results in fields such as optical character recognition, image labeling, and speech recognition. Advancements in hardware and...
View ArticleDME forensics DVR Examiner
DVR Examiner is a software solution for the recovery of video and metadata from DVR surveillance systems in a forensically sound manner. This “game changing” software can help save your team time and...
View ArticleADF Digital Evidence Investigator
ADF Digital Evidence Investigator® (DEI) is the industry leading digital investigation tool that leverages ADF’s proven track record of reducing forensic backlogs. Now you can conduct intelligent...
View ArticleADF Triage-Investigator
Triage-Investigator is the latest evolution of ADF's award-winning triage tool designed for field deployment. The tool has a proven track record of providing easy and quick access to court defendable...
View ArticleADF Triage-G2
Triage-G2 is the latest evolution of ADF's award-winning media exploitation tool which is deployed by special forces, military and intelligence agencies worldwide. The tool has a proven track record...
View ArticleMaresware recycle_i
recycled_i will decode the content of $I files in the windows $recycle.bin to show info regarding original file that is deleted.Category: Recycle BinCategory URL:...
View ArticleHashes.org
Hashes.org attempts to reveal the plain text of your submitted hash. This is done in an effort to assist security professionals to evaluate the security provided by the relevant hash...
View Articlewiki.skullsecurity.org/Passwords
Password dictionaries, leaked passwords, non-hacking dictionaries, Facebook listsCategory: Password ListsCategory URL: http://www.dfir.training/component/mtree/cryptography/password-lists?Itemid=
View Articledanielmiessler/SecLists
The Passwords directory will hold a number of password lists that can be used by multiple tools when attempting to guess credentials for a given targeted service. This will include a number of very...
View Article