web
analytics

Directory: Recently Added Listings RSS

github.com/sqlitebrowser/sqlitebrowser/releases/tag/v3.10.0-

All builds (both Windows and MacOS X) include SQLCipher for strong encryption. The version of SQLCipher included is a bit old. Our next beta or Release Candidate will include the newest version. The initial DBHub.io (remote dock) code still needs work ...
Read More...

hashdb archives New! Popular

0 reviews

peekatorrent.org/data.html

Our datasets We offer both data in raw format (archives of random torrent files), as well as pre-processed hasdhbdatabases. Make sure to run "7z x" to extract the archives to keep the folder structure intact, some file systems have troubles with a large ...
Read More...

Category:Hash

securcube.net/bts-tracker/

The BTS (Base Transceiver Station) measurement is a rising forensics analysis able to fulfil lack of clues given by the mobile devices. Securcube®BTS Tracker performs the scan of the real cell towers coverage, that is the current ‘performance’ of the radi ...
Read More...

Category:Misc

securcube.net/phonelog/

Securcube®Phonelog, software for the cross-analysis of CDRs (Call Detail Records), historical cell site location information (HCSLI), namely CSA, mobile extraction contents, GPS tracks and much more, can efficiently reply to every investigative expectatio ...
Read More...

Category:Misc

github.com/vitaly-kamluk/bitscout

Bitscout 2.0 Date: July 2017 Author: Vitaly Kamluk // Vitaly.Kamluk [at] kaspersky[.]com This project is created by security researchers for security researchers. In addition, it can be useful to Law Enforcement and private companies that assist t ...
Read More...

Category:Misc

strangelyrelevant.blogspot.com/2013/08/jackcr-issa-2013-netw

Unlike @JackCR's previous challenges, this one is 1. from a Linux server, and 2. does not have a memory component. Well, that is not entirely accurate, there is a memory dump but it is not usable because of the way that vmss2core produces a file that is n ...
Read More...

blog.mywarwithentropy.com/2014/11/spy-hunter-holiday-challen

This holiday season I have created a network forensics challenge for the community to try and solve. This scenario, called “Spy Hunter – Operation Hermes” is the first in a new series I am going to create and publish here at My War With Entropy.

p0wnlabs

0 reviews

www.p0wnlabs.com/free/vms

The community has coughed up some classic distributions full of juicy targets and p0wnlabs is testing out a program to host them for your hacking pleasure. Simply configure your system to connect to p0wnlabs via openvpn and hack away!

opensecuritytraining.info/ReverseEngineeringMalware.html

All material is licensed with an open license like CreativeCommons, allowing anyone to use the material however they see fit, so long as they share modified works back to the community.

www.netresec.com/?page=PcapFiles

This is a list of public packet capture repositories, which are freely available on the Internet.Most of the sites listed below share Full Packet Capture (FPC) files, but some do unfortunately only have truncated frames.

www.cfreds.nist.gov/mobile/cellebrite/index.htm

The UFED Reader is an application allowing users to share analysis reports. Features include: advanced analyzing capabilities (e.g., search and entity bookmark functionalities) and report generation in the following formats: pdf, html, xml, Excel, UFED Re ...
Read More...

Puzzles!

0 reviews

forensicscontest.com/puzzles

If you grabbed a contest disc to play after DEFCON, here are the passwords you’ll need to mount the TrueCrypt volume for each round.

tuts4you.com/download.php?list.17

Nice collection of tutorials aimed particularly for newbie reverse enginners..

malwarejake.blogspot.com/2015/05/packet-analysis-practice-pa

While teaching SANS SEC503 (Intrusion Detection In-Depth) I routinely create extra exercises for students throughout the week.  One of the things that trips students up when taking the GCIA is the ability to decode packets at the hex level.  As one of my ...
Read More...

www.mcafee.com/us/downloads/free-tools/hacme-bank.aspx

Hacme Bank™ is designed to teach application developers, programmers, architects and security professionals how to create secure software. Hacme Bank simulates a "real-world" web services-enabled online banking application, which was built with a number o ...
Read More...

www.cfreds.nist.gov/FileCarving/index.html

This page contains links to dd images for the use of testing software applications with file carving capabilities. File carving is the practice of extracting files based on content, rather than on metadata. Extracting files from unallocated blocks is acco ...
Read More...

www.cfreds.nist.gov/mem/Basic_Memory_Images.html

The archive, a .RAR file, (http://www.rarlab.com/) contains images from the following systems.All of the 'boomer' systems were not engaged in any malicious or evennetwork based activity at the time of imaging. The boomer system has1GB of RAM.

dougee652.blogspot.com/2011/04/malware-memory-images.html

The memory images were created for testing and research purposes in the field of memory forensics. The images were created from a Windows XP system that was infected with malware that was received as an email attachement to a phishing email. The email con ...
Read More...