Michele M Jordan

CAINE (Computer Aided INvestigative Environment) is an Italian GNU/Linux live distribution created as a project of Digital Forensics CAINE offers a complete forensic environment that is organized to integrate existing software tools as software modules ...

Modified
The CarolinaCon Group

CarolinaCon is an annual conference in North Carolina that is dedicated to sharing knowledge about technology, security and information rights. CarolinaCon also serves to enhance the local and international awareness of current technology related issues ...

Modified
Kristinn Gudjonsson

log2timeline is a framework for automatic creation of a super timeline. The main purpose is to provide a single tool to parse various log files and artifacts found on suspect systems (and supporting systems, such as network equipment) and produce a timeli ...

Category Forensic Tools
ModifiedNever
Golden G. Richard III

Scalpel is a fast file carver that reads a database of header and footer definitions and extracts matching files from a set of image files or raw device files. Scalpel is filesystem-independent and will carve files from FATx, NTFS, ext2/3, or raw partitio ...

Category Forensic Tools
Modified

Rifiuti2 analyses recycle bin files from Windows. Rifiuti2 can extract file deletion time, original path and size of deleted files. For more ancient versions of Windows, it can also check whether deleted items were not in recycle bin anymore (that is, eit ...

Category Forensic Tools
Modified
Rifiuti2
Commercial
Pricing Model

BruCON is an annual security and hacker(*) conference providing two days of an interesting atmosphere for open discussions of critical infosec issues, privacy, information technology and its cultural/technical implications on society. Organized in Brussel ...

Modified
Commercial
Pricing Model

Utilikilts offers a total of 6 different models Standard Models: The Mocker The Spartan The Workman The Survival Special Offerings or Limited Run Offerings: The Tuxedo The Beast (Leather)

Category Geeky Gadgets
Modified
Utilikilts
Palo Alto Networks

The Palo Alto Networks Next-Generation Security Platform has four key characteristics that enable the prevention of successful cyberattacks: Natively integrated technologies that leverage a single-pass architecture to exert positive control based on ap ...

Modified
Palo Alto Networks Next Generation Firewalls

This training course offers a collection of live demonstrations featuring a variety of hacking and defensive techniques used by hackers. Tranchulas online labs are available 24×7 for practising the techniques and tools demonstrated by our instructor durin ...

Category Ethical Hacking
Modified
Hands-On Penetration Testing and Ethical Hacking Training

This training course is a series of educational interactive training sessions where the attendees will gain hands-on experience. They will be able to identify security flaws in web applications customised or built for the training course. They will also b ...

Modified
Brian Carrier

Autopsy is a digital forensics platform and graphical interface to The Sleuth Kit® and other digital forensics tools. It is used by law enforcement, military, and corporate examiners to investigate what happened on a computer. You can even use it to recov ...

Category Forensic Tools
Modified
Autopsy

SCNR is a modular, distributed, high-performance DAST web application security scanner framework, capable of analyzing the behavior and security of modern web applications and web APIs. It is inspired and built by the more than a decade of experience gat ...

Category Website Scanners
Modified
SCNR
Hitachi ID Systems, Inc.
Commercial
Pricing Model

Hitachi ID Bravura Pass is an integrated solution for managing credentials across systems and applications. It simplifies the management of passwords, tokens, smart cards, security questions and biometrics. Bravura Pass lowers IT support cost and imp ...

Modified
Hitachi ID Bravura Pass
Hitachi ID Systems, Inc.
Commercial
Pricing Model

Hitachi ID Bravura Identity is an integrated solution for managing identities, groups and security entitlements across systems and applications. It ensures that users are granted access quickly, that entitlements are appropriate to business need and that ...

Modified
Hitachi ID Bravura Identity
Hitachi ID Systems, Inc.
Commercial
Pricing Model

Hitachi ID Bravura Privilege secures access to elevated privileges. It eliminates shared and static passwords to privileged accounts. It enforces strong authentication and reliable authorization prior to granting access. User access is logged, creating st ...

Modified
Hitachi ID Bravura Privilege
Hitachi ID Systems, Inc.
Commercial
Pricing Model

Bravura Identity is an integrated solution for managing identities, groups and security entitlements across systems and applications. It ensures that users are granted access quickly, that entitlements are appropriate to business need and that access is r ...

Modified
Bravura Identity

The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and funct ...

Category Website Scanners
Modified
Spiceworks, Inc.

Spiceworks! The free “everything IT” network management software. Inventory Your Network Monitor Your Network Run an IT Help Desk Manage Configuration Changes Map Your Network With Spiceworks you can: * Create a network map of your IT network * See networ ...

Category Network Mapping
Modified
Spiceworks
Andrés Riancho
Open Source
Pricing Model

w3af is a Web Application Attack and Audit Framework. The project's goal is to create a framework to find and exploit web application vulnerabilities that is easy to use and extend. The framework is extended using plugins. For now, think about nessus p ...

Category Website Scanners
ModifiedNever
w3af
London Metropolitan University
Open Source
Pricing Model

3 years Full Time

ModifiedNever