List Categories and Listings by F

Middlesex University
Open Source
Pricing Model

4 years Full Time

ModifiedNever

F-Response is a vendor neutral, patented software utility that enables an investigator to conduct live forensics, Data Recovery, and eDiscovery over an IP network using their tool(s) of choice. F-Response is not another analysis tool. F-Response is a util ...

Category Remote Forensics
ModifiedNever
Commercial
Pricing Model

The FireEye Malware Analysis System (MAS) gives threat analysts hands-on control over powerful auto-configured test environments where they can safely execute and inspect advanced malware, zero-day, and targeted APT attacks embedded in common file formats ...

ModifiedNever
FireEye MAS
GetData Forensics
Commercial
Pricing Model

Forensic Explorer is fully featured computer forensics software that is an alternative to FTK or EnCase. It is non-invasive and allows examiners to access, view, and search large volumes of electronic evidence quickly and efficiently. Forensic Explorer h ...

Category Forensic Tools
Modified
Limited Free Trial
Pricing Model

FlowNBA is a complete solution for network monitoring based on NetFlow/IPFIX. Thanks to the used technology it enables complete overview of the network traffic, detailed information about all communications and provides information about who communicates ...

Modified
Mike Schiffman

Firewalk is an active reconnaissance network security tool that attempts to determine what layer 4 protocols a  given IP forwarding device will pass. Firewalk  works  by sending out TCP or UDP packets with a TTL one greater than the targete ...

Modified
Firewalk
Commercial
Pricing Model

The Check Point Full Disk Encryption Software Blade provides automatic security for all information on endpoint hard drives, including user data, operating system files and temporary and erased files. For maximum data protection, multi-factor pre-boot aut ...

Modified
Full Disk Encryption Software Blade
Elcomsoft Co. Ltd
Commercial
Pricing Model

Perform the complete forensic analysis of encrypted disks and volumes protected with desktop and portable versions of BitLocker, PGP and TrueCrypt. Elcomsoft Forensic Disk Decryptor allows decrypting data from encrypted containers or mounting encrypted vo ...

Category Forensic Tools
Modified
Forensic Disk Decryptor
Commercial
Pricing Model

FOR572: Advanced Network Forensics and Analysis, was built from the ground up to cover the most critical skills needed to mount efficient and effective post-incident response investigations. It focuses on the knowledge necessary to expand the forensic min ...

Modified
Freeware
Pricing Model

FAW is the first browser conceived to acquire web pages for forensic purposes from any website. The program allows acquiring a whole, full resolution web page or just part of it, quick selecting the area. It is also able to collect videos or pages with si ...

Category Forensic Tools
Modified
Commercial
Pricing Model

Whether its a line of source code, an entry into a log file, a legal brief, or even a letter, FileLocator Pro helps you find things fast. It's features make it possible to dig out information in even the most obscure file formats. Review highlighed keywo ...

Category Forensic Tools
Modified
FileLocator Pro
Foxton Software
Commercial
Pricing Model

FoxAnalysis Plus is a software tool for extracting, viewing and analysing internet history from the Mozilla Firefox web browser. Website visits can be viewed in a navigable timeline structure for easily viewing the times in which websites have been visit ...

Category Forensic Tools
Modified
FoxAnalysis Plus
David Wheeler
Open Source
Pricing Model

Flawfinder is a simple program that examines C/C++ source code and reports possible security weaknesses (“flaws”) sorted by risk level. It’s very useful for quickly finding and removing at least some potential security problems before a program is widely ...

Modified
idontwanttowork.com
Freeware
Pricing Model

Simple site used to test firewall rules. Select TCP ports, click test, and it will attempt to connect to the target server you specify. Free, but does contain ads in header and footer.

Modified

This popular course explores malware analysis tools and techniques in depth. FOR610 training has helped forensic investigators, incident responders, security engineers, and IT administrators acquire the practical skills to examine malicious programs that ...

Modified
Commercial
Pricing Model

Fireglass Threat Isolation Platform eliminates malware and phishing by isolating critical attack vectors including web pages, emails and documents. Transparent Clientless Rendering (TCR) technology transforms all web content into a safe visual stream and ...

Modified
Gimpel Software LLC
Commercial
Pricing Model

PC-lint and FlexeLint are powerful static analysis tools that will check your C/C++ source code and find bugs, glitches, inconsistencies, non-portable constructs, redundant code, and much more. It looks across multiple modules, and so, enjoys a perspectiv ...

ModifiedNever
FlexeLint
FortiNet Inc.
Commercial
Pricing Model

FortiWeb, Fortinet’s Web Application Firewall, protects your business-critical web applications from attacks that target known and unknown vulnerabilities. FortiWeb WAFs provide advanced features that defend your web applications and APIs from known and ...

Category WAF - Appliances
Modified
FortiWeb

© Computer Network Defence Limited 2021