SkypeFreak Logo

SkypeFreak

0
Free
Visit Website

A Forensic Framework for Skype. Just type $ python SkypeFreak.py in order to run the application. The program resides in the source directory. Default run of the program produces the following output: 8""""8 8 e e e e eeeee eeee 8eeeee 8 8 8 8 8 8 8 88 8eee8e 8eeee8 8eee8 8eee e 88 88 8 88 88 88 8eee88 88 8 88 88 88ee 8"""" 8 eeeee eeee eeeee e e 8eeee 8 8 8 8 8 8 8 88 8eee8e 8eee 8eee8 8eee8e 88 88 8 88 88 8 88 8 88 88 8 88ee 88 8 88 8 [*] A creation of Osanda Malith & contributors [*] Follow @OsandaMalith and @yasoobkhalid [*] URL: http://osandamalith.github.io/SkypeFreak/ [~] What Do You Like to Investigate? 1. Profile 2. Contact 3. Calls 4. Messages 5. Generate Full Report 6. Print the list of contributors & exit 7. Exit Select the option which you deem suitable for the given conditions. After that Skype Freak will perform the given task and will print the output to console and will ask you to write the extracted data to disk. If you would like to suggest any improvements then feel free to open a new issue. The Freak series: We are trying to develop some standalone forensic programs for various computer applications. These programs will be later joined together to ma

FEATURES

ALTERNATIVES

Toolkit for post-mortem analysis of Docker runtime environments using forensic HDD copies.

ShadowCopy Analyzer is a tool for cybersecurity researchers to analyze and utilize the ShadowCopy technology for file recovery and system restoration.

Web interface for the Volatility Memory Analysis framework with advanced features.

A library and tools to access and manipulate VMware Virtual Disk (VMDK) files.

A reverse engineering framework with a focus on usability and code cleanliness

usbdeath is an anti-forensic tool that manipulates udev rules for known USB devices and performs actions on unknown USB device insertion or specific USB device removal.

PowerForensics is a PowerShell digital forensics framework for hard drive forensic analysis.

A python module for orchestrating content acquisitions and analysis via Amazon SSM.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved