FS-NyarL Pentesting & Forensics Framework
P { margin-bottom: 0.08in; }H2 { margin-bottom: 0.08in; }H2.western { font-family: "Liberation Sans",sans-serif; font-size: 14pt; font-style: italic; }H2.cjk { font-family: "Droid Sans"; font-size: 14pt;...
peepdf PDF Analysis Tool
peepdf is a Python tool to explore PDF files in order to find out if the file can be harmful or not. The aim...
Computer Forensics Gains Popularity On Screen
Television shows and movies that deal with crime are often full of various types of forensic specialists who are instrumental in solving the cases...
Santoku Linux Mobile Forensic & Security Distribution
Santoku is a platform for mobile
forensics, mobile malware analysis and mobile application security
assessment. The free Santoku Community Edition...
Computer Aided Investigative Environment- Forensic
Forensic science and specially computer forensic is an important division of information security, incidence response is required against any hacking...
NetworkMiner – Windows Packet Analyzer & Sniffer
There are various operating system available like Windows, Linux, MAC, BSD and more but most of the penetration tester...
Volatility-Advanced Memory Forensics Framework
Computer forensic is now an important field of information security, forensic has a broad field of interest. There are different courses and trainings are...
Computer Forensic Framework-PTK
Computer forensic is a branch of digital forensic science and an act to investigate, analyze, identify and collect evidence or information which is encoded...
DEFT Linux- Computer Forensic Live CD
As discussed so many tools and tutorial on penetration testing to make the network or a specific server more and more secure, but what...
Most Read
What Makes ICS/OT Infrastructure Vulnerable?
Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...
Everything You Must Know About IT/OT Convergence
What is an Operational Technology (OT)?
Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...
Understand the OT Security and Its Importance
This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...
What is Deepfake, and how does it Affect Cybersecurity?
Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...