Skip to main content

Michele M Jordan

Nuix Evidence Mover is designed to copy evidence files images from one storage location, to antoher. It creates a hash of the files before and after moving to ensure the data has been copied accurately, and to maintain the chain of custody.

Category Forensic Tools
Nuix Evidence Mover

Viewer for standalone files containing Microsoft Outlook Express 4,5 and 6 message database (*.idx/*.mbx/*.dbx), Windows Vista Mail/Windows Live Mail and Mozilla Thunderbird message databases as well as standalone EML files. This application is based on ...

Category Forensic Tools
Mail Viewer
KernelApps Private Limited

Kernel Exhcnage EDB Viewer is an Exchange Mailbox viewer tool, that assists system administrators in opening EDB files even in the absence of MS Exchange Servers. Now recover your corrupt exchange database files for free and review their entire contents ...

Category Forensic Tools
Kernel Exchange EDB Viewer

Belkasoft X (Belkasoft Evidence Center X) is a flagship tool by Belkasoft for computer, mobile and cloud forensics. It can help you to acquire and analyze a wide range of mobile devices, run various analytical tasks, perform case-wide searches, bookmark a ...

Category Forensic Tools
Belkasoft Evidence Center Portable

Belkasoft X (Belkasoft Evidence Center X) is a flagship tool by Belkasoft for computer, mobile and cloud forensics. It can help you to acquire and analyze a wide range of mobile devices, run various analytical tasks, perform case-wide searches, bookm ...

Belkasoft Evidence Center X

Belkasoft Live RAM Capturer is a tiny free forensic tool that allows to reliably extract the entire contents of computer’s volatile memory—even if protected by an active anti-debugging or anti-dumping system. Separate 32-bit and 64-bit builds are availabl ...

Category Forensic Tools
Belkasoft Live RAM Capturer

The first forensic browser able to quickly and easly capture web pages that are to be brought to trial in criminal and civil proceedings. Acquisition of all websitesFAW acquires websites of any type: HTML5, CMS, static, dynamic, with frames, blogs, e-com ...

Category Forensic Tools
Forensic Acquisition of Websites
Magnet Forensics

AXIOM Cyber is a robust digital forensics and incident response solution for businesses that need to perform remote acquisitions and collect & analyze evidence from computers, the cloud, and mobile devices.Off-Network CollectionAXIOM Cyber enables you ...

Category Forensic Tools
AXIOM Cyber
Magnet Forensics

Encrypted Disk Detector is a command-line tool that can quickly, and non-intrusively, check for encrypted volumes on a computer system during incident response. The decision can then be made to investigate further and determine whether a live acquisition ...

Category Forensic Tools
Encrypted Disk Detector
Farproc Tools

Wifi Analyzer is a free Android app you can use for finding APs on your Android-based smartphone or tablet. It lists the basic details for APs on the 2.4-GHz band, and on supported devices on the 5-GHz band as well. You can export the AP list (in XML form ...

Category Wireless Tools
Wifi Analyzer

Vistumbler is an open source Windows application that finds Wireless access points - Uses the Vista command 'netsh wlan show networks mode=bssid' to get wireless information.  It displays the basic AP details, including the exact authentication and e ...

Category Wireless Tools
Vistumbler
Michael Ahrendt

Triage-IR is a script written by Michael Ahrendt, which will collect system information, network information, registry hives, disk information and will also dump memory. One of the capabilities of Triage-IR is collecting information from Volume Shadow Cop ...

Category Forensic Tools
Triage-IR

vFeed framework is an open source naming scheme concept that provides extra structured detailed third-party references and technical characteristics for a CVE entry through an extensible XML schema. It also improves the reliability of CVEs by providing a ...

Category Uncategorised

The WiFi Pineapple is a unique device developed by Hak5 for the purpose of WiFi auditing and penetration testing. Since 2008 the WiFi Pineapple has grown to encompass the best rogue access point features, unique purpose-built hardware, intuitive web inter ...

Category Geeky Gadgets
WiFI Pineapple Mark V Standard

Blancco Mobile is designed to securely erase your smartphone’s internal and external memory. Restoring factory settings does not ensure that data is permanently destroyed, because your data can still be recovered afterwards. With Blancco Mobile, all user ...

Blancco Mobile

Comodo Antispam Gateway (CASG) is cloud based SaaS which prevents junk mail from ever entering your mail server, and its employee inboxes. It is able to filter virus, phishing, malware and harvesting spam attacks. Being cloud based makes it ideally suite ...

Our wireless internet security service creates a shield around your laptop, desktop or handheld. This prevents criminals from attacking or scanning the system from the local network that you're using to connect to the Internet. It also encrypts all traffi ...

Category VPN Clients
TrustConnect Wi-FI Internet Security

'Since 2010 the USB Rubber Ducky has been a favorite among hackers, penetration testers and IT professionals. With origins as a humble IT automation proof-of-concept using an embedded dev-board, it has grown into a full fledged commercial Keystroke I ...

Category Geeky Gadgets
USB Rubber Ducky Deluxe

Hacker Guardian PCI Compliance Scanning is designed for Website owners and E-commerce Merchants to secure transactions, in accordance with PCI Standards. HackerGuardian PCI Scanning is a vulnerability assessment scanning solution designed to achieve and ...

HackerGuardian PCI Scanning
Elcomsoft Co. Ltd

Elcomsoft Phone Password Breaker enables forensic access to password-protected backups for smartphones and portable devices based on RIM BlackBerry and Apple iOS platforms. The password recovery tool supports all Blackberry smartphones as well as Apple de ...

Category Forensic Tools
Phone Password Breaker