Unhide is a forensic tool to find hidden processes and TCP/UDP ports by rootkits / LKMs or by another hidden technique. Unix/Linux version Windows version Login TOP > Unhide homepage Powered By CMSimple.dk | Designed By DotcomWebdesign.com
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A library to access and read QEMU Copy-On-Write (QCOW) image file formats with support for zlib compression and AES-CBC encryption.
No More Ransom is a collaborative project to combat ransomware attacks by providing decryption tools and prevention advice.
MFT and USN parser for direct extraction in filesystem timeline format with YARA rule support.
An anti-forensic kill-switch tool for USB ports to shut down the computer immediately in case of unauthorized access.
Zenduty's platform provides real-time operational health monitoring and incident response orchestration to improve incident response times and build a solid on-call culture.
Browse and analyze iPhone/iPad backups with detailed file properties and various viewers.
A reverse engineering framework with a focus on usability and code cleanliness
Diffy is a digital forensics and incident response (DFIR) tool developed by Netflix's Security Intelligence and Response Team (SIRT) for scoping compromises across cloud instances.
A forensic research tool for gathering forensic traces on Android and iOS devices, supporting the use of public indicators of compromise.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.