Category: Forensics

modDetective

modDetective: investigate recent system activity tool

modDetective modDetective is a small Python tool that chronologizes files based on modification time in order to investigate recent system activity. This can be used in red team engagements and CTF‘s in order to...

CDQR

CDQR v20191226 releases: Cold Disk Quick Response tool

What is CDQR? The CDQR tool uses Plaso to parse disk images with specific parsers and create easy to analyze custom reports. The parsers were chosen based on triaging best practices and the custom...

Network Forensic Analysis Tool

Xplico: network traffic monitoring tools

Xplico Xplico is a Network Forensic Analysis Tool (NFAT). The goal of Xplico is extracted from internet traffic to capture the data of the application contained. For example, from a pcap file Xplico extracts...

Heralding honeypot

heralding v1.0.7 releases: Credentials catching honeypot

Heralding Sometimes you just want a simple honeypot that collects credentials, nothing more. Heralding is that honeypot! Currently, the following protocols are supported: ftp, telnet, ssh, http, https, pop3, pop3s, imap, imaps, smtp, vnc,...

dfirtrack

dfirtrack v2.5 releases: The Incident Response Tracking Application

DFIRTrack DFIRTrack (Digital Forensics and Incident Response Tracking application) is an open-source web application mainly based on Django using a PostgreSQL database backend. In contrast to other great incident response tools, which are mainly case-based and support...

Cowrie

cowrie v2.5 releases: Cowrie SSH/Telnet Honeypot

What is Cowrie Cowrie is a medium interaction SSH and Telnet honeypot designed to log brute force attacks and the shell interaction performed by the attacker. Cowrie is developed by Michel Oosterhof. Features Some interesting...

fastnetmon

fastnetmon v1.2.6 releases: very fast DDoS analyzer

FastNetMon – A high-performance DoS/DDoS load analyzer built on top of multiple packet capture engines (NetFlow, IPFIX, sFLOW, SnabbSwitch, netmap, PF_RING, PCAP). What can we do? We can detect hosts in our networks sending...