Latest Posts:


GKE Auditor - Detect Google Kubernetes Engine Misconfigurations GKE Auditor – Detect Google Kubernetes Engine Misconfigurations
GKE Auditor is a Java-based tool to detect Google Kubernetes Engine misconfigurations, it aims to help security & dev teams streamline the configuration process
zANTI - Android Wireless Hacking Tool Free Download zANTI – Android Wireless Hacking Tool Free Download
zANTI is an Android Wireless Hacking Tool that functions as a mobile penetration testing toolkit that lets you assess the risk level of a network using mobile.
HELK - Open Source Threat Hunting Platform HELK – Open Source Threat Hunting Platform
The Hunting ELK or simply the HELK is an Open-Source Threat Hunting Platform with advanced analytics capabilities such as SQL declarative language, graphing etc
trape - OSINT Analysis Tool For People Tracking Trape – OSINT Analysis Tool For People Tracking
Trape is an OSINT analysis tool, which allows people to track and execute intelligent social engineering attacks in real-time.
Fuzzilli - JavaScript Engine Fuzzing Library Fuzzilli – JavaScript Engine Fuzzing Library
Fuzzilii is a JavaScript engine fuzzing library, it's a coverage-guided fuzzer for dynamic language interpreters based on a custom intermediate language.
OWASP APICheck - HTTP API DevSecOps Toolset OWASP APICheck – HTTP API DevSecOps Toolset
APICheck is an HTTP API DevSecOps toolset, it integrates existing tools, creates execution chains easily and is designed for integration with 3rd parties.


8 Responses to The Revisionist – Metadata Retrieval Tool

  1. eM3rC January 8, 2008 at 8:45 am #

    Very cool program.

    Aside from reformatting and wiping the hard drive thirty times is there any way to securely delete data?

    I use Window Washer to clear stored up information but if someone could recommend a better program that would be great.

  2. goodpeople January 8, 2008 at 2:27 pm #

    Very usefull. I used a tool like this in a job conflict situation once. It gave me lots of extra information that my boss really didn’t want me to have.

  3. Sir Henry January 8, 2008 at 4:45 pm #

    @eM3rc:

    A hammer has always worked well for me to completely invalidate and chances of recovery.

    @goodpeople:

    I truly love anecdotal histories of your sort. You will have to provide that as an aside in more detail at some point.

    As for this tool, I can imagine a good use to simply save yourself from embarrassment. For instance, I once got a copy of a friend’s resume so that I could mimic the format and style. What I did not know until looking at the file attributes was that the metadata contained his name, email, address, etc. This was helpful for him, obviously, but could have been disastrous to me (more my ego than anything else).

  4. eM3rC January 9, 2008 at 3:02 am #

    @ Sir Henry

    I was looking for something more along the lines of erasing it so it would be repairable. =P

    Magnets seem to work just as well although it literally removed everything.

  5. eM3rC January 9, 2008 at 3:37 am #

    This is a really off topic post but I need to ask this community a couple of questions.

    First, I know this is a never ending argument, but I would like to know what linux distributions you guys could recommend for a user who is involved in programming, gaming, video/photo editing and other graphically intensive stuff.

    Second, my computer protection software is going to expire soon and I was wondering what you think the top 3 pieces of computer protection software are (combination of or security suites are both acceptable).

    Thanks in advance!

  6. Sir Henry January 9, 2008 at 3:09 pm #

    @eM3rC:

    I, personally, use Ubuntu, but have found the latests versions (7,04/7,10) to be a bit bloated and veering away from what value they had in the 6.x versions. Given, I could always rebuild the kernel, but I will choose to check out other distros because it is always a good thing to see what else is out there. Also, and I know that goodpeople will back me up here, KDE 4.0 will be released in two days and looks to be a very good offering and fierce competitor to Gnome. Do not get me wrong, I love my Gnome, but, again, I am always game to find something that may work better for me.

    As for your second question, it depends upon how deep you are willing to go. What you might want to figure out is what you want to protect, first and foremost. Then, based upon that, look at what is the best out there to do what you need. I work in all aspects of security (network, end point, pki, etc) so a question like that is hard to answer without knowing more about your needs.

  7. goodpeople January 9, 2008 at 4:54 pm #

    @eM3rC

    .. and we also need some information on what games you like to play, what language you do your programming in, etc.

    Your security issue:

    – Comodo firewall
    – Avira virusscanner
    – BoClean anti spyware

  8. eM3rC February 7, 2008 at 2:53 am #

    @Sir Henry

    Thanks for the info about the linux operating systems. From what I’ve read, it appears gnome is a more stable and speed based approach while KDE is like windows eye candy. As for security, all I want is my basic protection. I do not have anything valuable on my computer and see no reason why it would be hacker aside from botnets or some hacker testing out his skills. As for the type, all I would need is basic AV, spyware, maybe rootkit and firewall although I would not like a resource hog.

    @goodpeople

    Basic steam games like Orange Box, CSS and hopefully CoD4. At this point I am only working on C++ but plan to move to languages such as java and python sometime in the near future.

    thanks for the recommendations!