exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 151 - 163 of 163 RSS Feed

Forensics Files

wft_20050514.zip
Posted Aug 14, 2005
Authored by Monty McDougal | Site foolmoon.net

The Windows Forensic Toolchest (WFT) was written to provide an automated incident response [or even an audit] on a Windows system while collecting security-relevant information from the system. WFT is essentially a forensically enhanced batch processing shell capable of running other security tools and producing HTML based reports in a forensically sound manner.

tags | tool, shell, forensics
systems | windows
SHA-256 | 6813e639f5c3bedb2cf043df9ed01affe042b3c9e8ba04981f48a3c42ad9272f
airt-0.4-1.tar.bz2
Posted Jan 25, 2005
Authored by madsys, CoolQ

AIRT (Advanced incident response tool) is a set of incident response assistance tools for Linux. Tools allow you to look for hidden modules, processes, and ports. Additionally, two tools will dump and analyze hidden modules.

Changes: Bug fix release and made the mod_hunter more heuristic.
tags | tool, forensics
systems | linux
SHA-256 | 9686c7f859e29a96749089080f8f3ae874bff6d2ed8eca513afe8e9c935f527e
pyflag_0.74.tar.bz2
Posted Jan 22, 2005
Authored by scudette | Site pyflag.sourceforge.net

FLAG, or Forensic and Log Analysis GUI, is an application designed to assist IT security professionals with analyzing log files, tcpdump files and hard disk images for forensic evidence. It utilizes Ethereal and Sleuthkit.

Changes: This release features much more powerful and mature scanner architecture. Revamped documentation on the web site. More robust plugin architecture. See the changelog for more.
tags | tool, forensics
SHA-256 | 8a99e0ec9b3438b56aa3cbce3c4d33deaffa4ad6fabecdf506e2de008ab92730
airt-0.1.tar.bz2
Posted Dec 12, 2004
Authored by madsys, CoolQ

AIRT (Advanced incident response tool) is a set of incident response assistance tools for Linux. Tools allow you to look for hidden modules, processes, and ports. Additionally, two tools will dump and analyze hidden modules.

tags | tool, forensics
systems | linux
SHA-256 | ed1fa893e032cfcfddf136f0d364fd8b082fa2baf0a415d57f50997a57cfece6
pyflag-0.60.tar.bz2
Posted Mar 18, 2004
Authored by scudette | Site pyflag.sourceforge.net

FLAG, or Forensic and Log Analysis GUI, is an application designed to assist IT security professionals with analyzing log files, tcpdump files and hard disk images for forensic evidence. It utilizes Ethereal and Sleuthkit.

tags | tool, forensics
SHA-256 | c4d0d549ab071f75b8bbb61a9f2dfbeafe9f2de40633f3fd05de71d0564452f2
autopsy-1.75.tar.gz
Posted Nov 21, 2003
Authored by Brian Carrier | Site sleuthkit.org

The Autopsy Forensics Browser is a graphical interface to The Sleuth Kit (TASK). Autopsy allows one to view allocated and deleted file system content in a "File Manager" style interface, create timelines of file activity, sort files by type, and perform key word searches.

Changes: Fixed some bugs and improved error messages.
tags | tool, forensics
SHA-256 | 61d752dcec0c92b9a7bb0dcc844a24e8b30913646d2f64d78e2fbb5deb440033
sleuthkit-1.66.tar.gz
Posted Nov 21, 2003
Authored by Brian Carrier | Site sleuthkit.org

The Sleuth Kit is a collection of open source file system forensics tools that allow one to view allocated and deleted data from NTFS, FAT, FFS, and EXT2FS images. The Autopsy Forensic Browser provides a graphical interface to The Sleuth Kit.

Changes: Added support for Solaris x86 partition tables to 'mmls', Fixed compilation problems in OpenBSD 3 and several other bugs and minor feature additions.
tags | tool, forensics
SHA-256 | 2ef8cd41584b70c595c997932c5f219bf03632be6bf787f6333e75349026b29c
autopsy-1.74.tar.gz
Posted Oct 9, 2003
Authored by Brian Carrier | Site sleuthkit.org

The Autopsy Forensics Browser is a graphical interface to The Sleuth Kit (TASK). Autopsy allows one to view allocated and deleted file system content in a "File Manager" style interface, create timelines of file activity, sort files by type, and perform key word searches.

tags | tool, forensics
SHA-256 | 5e514879f77a30c1b6c5eb222f5fcd42a74dce85c50a61d3ffd185aea07b984e
sleuthkit-1.65.tar.gz
Posted Oct 9, 2003
Authored by Brian Carrier | Site sleuthkit.org

The Sleuth Kit is a collection of open source file system forensics tools that allow one to view allocated and deleted data from NTFS, FAT, FFS, and EXT2FS images. The Autopsy Forensic Browser provides a graphical interface to The Sleuth Kit.

tags | tool, forensics
SHA-256 | 7d026ec2e16d8ccacece01a494c97bb7f15f0c569ef4841571de6045c95c5c28
autopsy-1.62.tar.gz
Posted Oct 22, 2002
Authored by Brian Carrier | Site atstake.com

The Autopsy Forensic Browser is an HTML-based graphical interface to The here.

Changes: Bug fixes.
tags | tool, forensics
SHA-256 | cde4370054a7517eb875f440b96f74eecd787db70646c17b539c794decd11608
pdd-1.11.zip
Posted Sep 12, 2002
Authored by Joe Grand | Site consilium-iii.com

Pdd (Palm dd) is a Windows-based tool for for memory imaging and forensic acquisition of data from the Palm OS family of PDAs. Pdd will preserve the crime scene by obtaining a bit-for-bit image or "snapshot" of the Palm device's memory contents. Such data can be used by forensic investigators and incident response teams.

tags | tool, forensics
systems | windows
SHA-256 | 6e0fb5a1061f176311aa320ef23ad3cc13753f68dab1ada83300f6fa78e67ff3
mac-robber-1.00.tar.gz
Posted Sep 12, 2002
Authored by Brian Carrier | Site atstake.com

Mac-robber is a forensics and incident response program that collects Modified, Access, and Change (MAC) times from files. Its output can be used as input to the 'mactime' tool in The @stake Sleuth Kit (TASK) to make a time line of file activity. mac-robber is similar to running the 'grave-robber' tool from The Coroner's Toolkit with the '-m' flag, except this is written in C and not Perl.

tags | tool, perl, forensics
SHA-256 | fba5080859c28624e2e603940d5efd60cb02546d431f19f5ace0fbf4a7ad88db
autopsy-1.60.tar.gz
Posted Sep 12, 2002
Authored by Brian Carrier | Site atstake.com

The Autopsy Forensic Browser is an HTML-based graphical interface to The here.

tags | tool, forensics
SHA-256 | 7082a6700ccd1c6090ef3d8e04453441c07498c803d272c05f52b45e9c6e55ca
Page 7 of 7
Back34567Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    0 Files
  • 3
    May 3rd
    0 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close