Silk Guardian Logo

Silk Guardian

0
Free
Visit Website

Silk Guardian is an anti-forensic Linux Kernel Module (LKM) kill-switch that monitors USB ports for changes, deletes files, and shuts down the computer. It was inspired by usbkill and serves as a fun project for learning. The tool is designed to prevent unauthorized access to the system and enhance security, especially in scenarios where physical access to the machine is a concern. To run Silk Guardian, compile the module using 'make', load it using 'sudo insmod silk.ko', and ensure the linux-headers package is installed. It is recommended to use (partial) disk encryption in conjunction with this tool for enhanced protection.

FEATURES

ALTERNATIVES

View physical memory as files in a virtual file system for easy memory analysis and artifact access.

A Cross-Platform Forensic Framework for Google Chrome that allows investigation of history, downloads, bookmarks, cookies, and provides a full report.

Automated digital image forensics tool

Automated Mac Forensic Triage Collector

A Python 2.x tool for memory analysis on Mac OS X systems with support for various OS versions and memory image export capabilities.

Second-order subdomain takeover scanner

A digital artifact extraction framework for extracting data from volatile memory (RAM) samples, providing visibility into the runtime state of a system.

A script for extracting common Windows artifacts from source images and VSCs with detailed dependencies and usage instructions.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved