Ethical hacking tools and resources for penetration testing and red team operations. Task: Forensic AnalysisExplore 2 curated tools and resources
Want your tool featured here?
Get maximum visibility with pinned placement
A set of YARA rules for identifying files containing sensitive information
A set of YARA rules for identifying files containing sensitive information
An image with commonly used tools for creating a pentest environment easily and quickly, with detailed instructions for launching in a VPS.
An image with commonly used tools for creating a pentest environment easily and quickly, with detailed instructions for launching in a VPS.