Category: Forensics

chainbreaker

chainbreaker: Mac OS X Keychain Forensic Tool

chainbreaker The chainbreaker can extract user credential in a Keychain file with Master Key or user password in forensically sound manner. Master Key candidates can be extracted from volafox or volatility keychaindump module. Supported...

glastopf

glastopf: Web Application Honeypot

Glastopf Glastopf is a Python web application honeypot founded by Lukas Rist. General approach: Vulnerability type emulation instead of vulnerability emulation. Once a vulnerability type is emulated, Glastopf can handle unknown attacks...

ARTLAS

ARTLAS: Apache Real Time Logs Analyzer System

ARTLAS Apache Real Time Logs Analyzer System Real-time Apache log analyzer, based on top 10 OWASP vulnerabilities, identifies attempts of exploration in your web application, and notify you or your...

inVtero.net

inVtero.net: A high speed (Gbps) Forensics, Memory integrity & assurance

inVtero.net: A high speed (Gbps) Forensics, Memory integrity & assurance. Includes offensive & defensive memory capabilities. Find/Extract processes, hypervisors (including nested) in memory dumps using microarchitecture independent Virtual Machine Introspection...

turbinia

turbinia: Automation and Scaling of Digital Forensics Tools

Turbinia is an open-source framework for deploying, managing and running forensic workloads on cloud platforms. It is intended to automate running of common forensic processing tools (i.e. Plaso, TSK, strings,...