Tools and methodologies for investigating digital incidents and gathering electronic evidence. Task: Security
Explore 11 curated tools and resources
A powerful reverse engineering framework
Open Backup Extractor is an open source program for extracting data from iPhone and iPad backups.
A file search and query tool for ops and security experts.
Exiv2 is a C++ library and command-line utility for image metadata manipulation.
Windows anti-forensics USB monitoring tool with the ability to shutdown the computer upon detecting the unplugging of a specified USB device.
A library to access FileVault Drive Encryption (FVDE) encrypted volumes on Mac OS X systems.
A simple Golang application for storing NIST National Software Reference Library Reference Data Set (NSRL RDS) with md5 and sha1 hash lookup searches.
A Mac OS X forensic utility for ensuring correct forensic procedures during disk imaging.
Accessing databases stored on a machine by the Chrome browser and dumping URLs found.
libevt is a library to access and parse Windows Event Log (EVT) files.
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Stay ahead in cybersecurity. Get the week's top cybersecurity news and insights in 8 minutes or less.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
A cybersecurity platform that offers vulnerability scanning, Windows Defender and 3rd party AV management, and MFA compliance reporting, among other features.
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.