Tools and techniques for analyzing, reverse-engineering, and understanding malicious software. Task: Sensitive DataExplore 1 curated tools and resources
Want your tool featured here?
Get maximum visibility with pinned placement
A collection of YARA rules designed to identify files containing sensitive information such as usernames, passwords, and credit card numbers for penetration testing and forensic analysis.
A collection of YARA rules designed to identify files containing sensitive information such as usernames, passwords, and credit card numbers for penetration testing and forensic analysis.