Ghiro is a digital image forensics tool that is fully automated and open source. It is designed to run forensics analysis over a massive amount of images through a user-friendly web application. The tool is developed by Alessandro Tanasi and Marco Buoncristiano.
Dump iOS Frequent Locations from StateModel#.archive files.
Automated tool for parsing Windows registry hives and extracting valuable information for forensic analysis.
NBD is a userland implementation of the Network Block Device protocol, allowing for remote access to block devices over a network.
A powerful OSINT tool for creating custom templates for data extraction and analysis
A command-line tool for extracting detailed information from JPEG files, including image dimensions, compression, and metadata.
A Windows Registry hive extraction library that reads and writes Windows Registry 'hive' binary files.
A tool with advanced filtering capabilities for analyzing events based on time, path, weekday, and date.
Browse and analyze iPhone/iPad backups with detailed file properties and various viewers.
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Stay ahead in cybersecurity. Get the week's top cybersecurity news and insights in 8 minutes or less.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
A cybersecurity platform that offers vulnerability scanning, Windows Defender and 3rd party AV management, and MFA compliance reporting, among other features.
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.