NBD (Network Block Device) is a userland implementation of the Network Block Device protocol, allowing for the creation of a block device on a remote server and making it available as a local block device on the client. It provides a way to access remote block devices over a network, making it useful for various use cases such as cloud computing, virtualization, and distributed storage. The NBD protocol is implemented in various projects, including nbdkit, libnbd, qemu, and lwNBD, among others. The NBD implementation in this repository provides a server and client implementation of the protocol, allowing for the creation of a block device on a remote server and making it available as a local block device on the client.
FEATURES
ALTERNATIVES
A digital forensics tool that provides read-only access to file-system objects from various storage media types and file formats.
A toolkit for forensic analysis of network appliances with YARA decoding options and frame extraction capabilities.
A forensic tool to find hidden processes and TCP/UDP ports by rootkits or other hidden techniques.
A command line utility for managing volume shadow copies with capabilities for evasion, persistence, and file extraction.
A Cross-Platform Forensic Framework for Google Chrome that allows investigation of history, downloads, bookmarks, cookies, and provides a full report.
A portable volatile memory acquisition tool for Linux.
PINNED

InfoSecHired
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Mandos Brief Newsletter
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

Kriptos
An AI-driven data classification and governance platform that automatically discovers, analyzes, and labels sensitive information while providing risk management and compliance capabilities.

System Two Security
An AI-powered platform that automates threat hunting and analysis by processing cyber threat intelligence and generating customized hunt packages for SOC teams.

Aikido Security
Aikido is an all-in-one security platform that combines multiple security scanning and management functions for cloud-native applications and infrastructure.

Permiso
Permiso is an Identity Threat Detection and Response platform that provides comprehensive visibility and protection for identities across multiple cloud environments.

Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.

Adversa AI
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.