Skip to main content

Directory: All Listings 

Results 221 - 240 of 1237 This Category
All Listings

SMART is a software utility that has been designed and optimized to support data forensic practitioners and Information Security personnel in pursuit of their respective duties and goals. The SMART software and methodology have been developed with th ...

Zynamix GmbH

Do you need to analyze multiple variations of essentially the same program ? Do you need to understand the changes between two versions of a program ? Are you trying to detect code theft ? SABRE BinDiff uses a unique graph-theoretical approach to allow co ...

Category Forensic Tools

WebSlayer is a tool designed for bruteforcing Web Applications, it can be used for finding not linked resources (directories, servlets, scripts, etc), bruteforce GET and POST parameters, bruteforce Forms parameters (User/Password), Fuzzing, etc. The tools ...

Category Website Scanners
PTR Associates Ltd

This hands-on course is intended for auditors and security specialists who are aware their businesses use Oracle based products, but do not understand the database platform and therefore the risks it may carry. You will learn how Oracle is built and a con ...

ManageEngine

Patch Manager Plus is an all-around patching solution, offering automated patch deployment for Windows, macOS, and Linux endpoints, along with patching support for 950+ third-party updates across 850+ third party applications. It's available both on-premi ...

LogSat Software

We created SPAM Filter ISP to implement what many SMTP servers lack: Spam Filtering. SPAMFilter ISP's implementation is very simple. Its use is designed for ISPs and companies running their SMTP servers, not end-users. SPAM Filter ISP is designed to be a ...

Safend Protector prevents internal/external data leakage by monitoring endpoint devices and data flow. Using granular and customizable security policies and rules, Protector automatically detects, permits and restricts files and encrypts media devices. Ve ...

Safend Protector
Mares and Company, LLC

Maresware: The Suite provides an essential set of tools for investigating computer records plus powerful data analysis capabilities. This bundled suite of over 40 separate, highly-targeted programs gives you the flexibility to accomplish a wide variety of ...

Category Forensic Tools
U.S. Department of Justice's National Institute of Justice (NIJ), and the National Institute of Standards and Technology (NIST)

The National Software Reference Library (NSRL) is designed to collect software from various sources and incorporate file profiles computed from this software into a Reference Data Set (RDS) of information. The RDS can be used by law enforcement, governmen ...

Category Forensic Tools

The goal of Xplico is extract from an internet traffic capture the applications data contained. For example, from a pcap file Xplico extracts each email (POP, IMAP, and SMTP protocols), all HTTP contents, each VoIP call (SIP), FTP, TFTP, and so on. Xplico ...

Infosec Institute

 This boot camp teaches you how to use the tools and techniques used by cybercriminals to perform an ethical hack on your organization. You’ll learn ethical hacking methodologies and gain hands-on hacking experience in our cloud-hosted cyber range, i ...

Category Ethical Hacking
Ethical Hacking Dual Certification Boot Camp
PTR Associates Ltd

You will learn what the components of Microsoft SQL Server 7 are and understand what the system administrators should be doing. Find out how to get information out of SQL Server and how to interpret it. Experiment with a live SQL Server 7 network in a lab ...

The annual DIMVA conference serves as a premier forum for advancing the state of the art in intrusion detection, malware detection, and vulnerability assessment. Each year DIMVA brings together international experts from academia, industry and government ...

SPAMfighter Exchange Module, SPAMfighter SMTP Anti Spam Server and SPAMfighter Hosted Spam Filter are the most effective and easy-to-use Spam Filters for protecting the company network against spam and phishing fraud. SPAMfighter Exchange Module (SEM), i ...

Information is the most important resource any organization controls, and ensuring its confidentiality is crucial in today?s world. Secure IT addresses continuing and new threats to information security as well as responses to the increasing risk of data ...

Arne Vidstrom

PMDump is a tool that lets you dump the memory contents of a process to a file without stopping the process. This can be useful in a forensic investigation.

Category Forensic Tools
Kroll Ontrack Ltd

Ontrack PowerControls recovers individual mailboxes, messages and attachments without needing to restore the entire backup. Use the powerful search capability to rapidly find the items you need for eDiscovery and compliance. Versions for Exchange, ShareP ...

Category Forensic Tools
Ontrack PowerControls

It is a tool for reengineering 3rd party, closed, binary Android apps. It can decode resources to nearly original form and rebuild them after making some modifications; it makes possible to debug smali code step by step. Also it makes working with app eas ...

Category Forensic Tools
android-apktool
Intense School

Intense School offers the finest Cisco Firewall Specialist certification training in the industry. During our intense boot camp, we guide you through configuring, troubleshooting and administering Cisco firewalls (PIX) and ASA (Adaptive Security Appliance ...

Code42 Incydr is a SaaS data risk detection tool that locates and mitigates insider threats without disrupting regular operations. It monitors and documents how employees use and share data between their computers and cloud services. All user activity is ...

Incydr