xxUSBSentinel Logo

xxUSBSentinel

0
Free
Visit Website

Windows anti-forensics USB monitoring tool. First you map a Key USB device - it can be a mouse, keyboard, flash drive etc. It will ask you to plug and unplug your device. Then the program remembers the device ID (VID:PID). After that you can arm the Sentinel and it would listen for device disconnect events and if your Key USB device is unplugged - xxUSBSentinel will shutdown your computer the fast way. The whole purpose of that is to make recovering your encrypted drive keys almost impossible. WARNING: This software will not encrypt or protect your data/drives, its only aim is to help you improve your operation security. Features Monitor and log all types of USB devices connecting and disconnecting Export logs to file Resolve device VID:PID Map a device to be a Key USB device Fast shutdown on Key USB device unplug Control everything from GUI or from the traybar icon Test mode option for practice Screenshots Installation No installation is needed, download release or build it yourself. Dependencies Currently it depends on LibUsbDotNet, but in future releases the library will be packed with the executable: LibUsbDotNet.dll Compatability The should work on most Windows systems.

FEATURES

ALTERNATIVES

A Mac OS X forensic utility for ensuring correct forensic procedures during disk imaging.

Free software for extracting Microsoft cabinet files, supporting all features and formats of Microsoft cabinet files and Windows CE installation files.

A framework for orchestrating forensic collection, processing, and data export.

Dissect is a digital forensics & incident response framework that simplifies the analysis of forensic artefacts from various disk and file formats.

A high-performance digital forensics exploitation tool for extracting structured information from various inputs without parsing file system structures.

A tool to quickly gather forensic artifacts from disk images or a live system into a lightweight container, aiding in digital forensic triage.

A library to access and parse OLE 2 Compound File (OLECF) format files.

CyLR is a Live Response Collection tool for quickly and securely collecting forensic artifacts from hosts with NTFS file systems.

PINNED

ImmuniWeb® Discovery Logo

ImmuniWeb® Discovery

ImmuniWeb Discovery is an attack surface management platform that continuously monitors an organization's external digital assets for security vulnerabilities, misconfigurations, and threats across domains, applications, cloud resources, and the dark web.

Attack Surface Management
InfoSecHired Logo

InfoSecHired

An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Resources
Mandos Brief Newsletter Logo

Mandos Brief Newsletter

A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

Resources
Checkmarx SCA Logo

Checkmarx SCA

A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Application Security
Check Point CloudGuard WAF Logo

Check Point CloudGuard WAF

A cloud-native web application and API security solution that uses contextual AI to protect against known and zero-day threats without signature-based detection.

Application Security
Orca Security Logo

Orca Security

A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

Cloud Security
DryRun Logo

DryRun

A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.

Application Security
Wiz Logo

Wiz

Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.

Cloud Security