Tag Archives | Forensics




Sagan – Real-time System & Event Log (syslog) Monitoring System

Softwink announces the release of Sagan, the ultimate in Syslog monitoring. Sagan can alert you when events are occurring in your syslogs that need your attention right away, in real time! Sagan is a multi-threaded, real time system- and event-log monitoring system, but with a twist. Sagan uses a “Snort” like rule set for detecting […]

Tags: , , , , , , , , , ,

Posted in: Countermeasures, Forensics, Network Hacking, Security Software | Add a Comment

Process Hacker v1.7 Released – Process Viewer & Memory Editor

Process Hacker is a free and open source process viewer and memory editor with unique features such as powerful process termination and a Regex memory searcher. It can show services, processes and their threads, modules, handles and memory regions. Key Features Viewing, terminating, suspending and resuming processes. Restarting processes, creating dump files, detaching from any […]

Tags: , , , , , , , , ,

Posted in: Forensics, Windows Hacking | Add a Comment

Katana v1 (Kyuzo) – Portable Multi-Boot Security Suite

The Katana: Portable Multi-Boot Security Suite is designed to fulfill many of your computer security needs. The idea behind this tool is to bring together many of the best security distributions and applications to run from one USB Flash Drive. Instead of keeping track of dozens of CDs and DVDs loaded with your favorite security […]

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , ,

Posted in: Hacking Tools, Password Cracking | Add a Comment

ScreenStamp! – Free Screenshot Tool With Timestamp

What is ScreenStamp! ScreenStamp! is basically a screen grabbing application for pen-testing and people working in forensics. The app will ask you for a location to save your screen shots to, along with a name that the program will number, allowing the user to concentrate on the job at hand as opposed to saving screen […]

Tags: , , , , , ,

Posted in: Forensics, Security Software | Add a Comment

Want Some COFEE? Microsoft Computer Online Forensic Evidence Extractor

Microsoft helping the good guys eh? I had someone ask me if I can get a hold of this so I did some checking up on.. I’d guess MS is doing this to sell additional software and services, but either way its a good thing to make a portable, easy to use and effective forensics […]

Tags: , , , , , , , ,

Posted in: Forensics, Windows Hacking | Add a Comment

Foremost – Recover Files From Drive or Drive Image AKA Carving

Foremost is a console program to recover files based on their headers, footers, and internal data structures. This process is commonly referred to as data carving. Foremost can work on image files, such as those generated by dd, Safeback, Encase, etc, or directly on a drive. The headers and footers can be specified by a […]

Tags: , , , , , , , , , ,

Posted in: Forensics | Add a Comment

Slavasoft FSUM and Hashcalc md5 & File Integrity for Windows

FSUM is a fast and handy command line utility for file integrity verification. It offers a choice of 13 of the most popular hash and checksum functions for file message digest and checksum calculation. You can easily use FSUM with a batch wrapper to do automated file integrity monitoring, and use something like blat to […]

Tags: , , , , , , ,

Posted in: Countermeasures, Forensics, Security Software | Add a Comment

Handy Recovery for Recovering Deleted Data on Windows

Handy Recovery is pretty neat software, there is occasions when I’m using Windows and I need to recover something or I’ve deleted something by mistake (I have a habit of using SHIFT+DEL so it’s not even in the recycle bin. I usually use Active Undelete and was pretty happy with it, I got a chance […]

Tags: , , , , , , , , ,

Posted in: Forensics, Security Software, Windows Hacking | Add a Comment

Data Recovery – A Decent Article

Data recovery is an important subject and it’s definitely a good thing to have a positive understanding of data recovery and how it could effort you personally or your business. So someone told me about this Data recovery article which is a decent original reference to data recovery which contains some good original information, links […]

Tags: , , , , ,

Posted in: Forensics, General Hacking | Add a Comment

A Forensic Analysis of the Lost Veteran’s Administration Laptop

An interesting speculative post on the forensics techniques that would most likely be used by the FBI during the investigation of the recovered Veteran’s Administration laptop. Most of them are pretty straight forwards if you have any kind of experience with digital forensics and data recovery (disaster recovery, incident response etc.) As a former Computer […]

Tags: , , , , , , ,

Posted in: Countermeasures, Forensics, General News | Add a Comment

Popular Tags

computer-security · darknet · Database Hacking · exploits · fuzzing · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · XSS ·