Tag Archive: Cyber intelligence



Permanent link to this article: http://www.darknessgate.com/2014/11/03/map-publicly-available-industrial-control-systems-published/


SEANux is an Ubuntu-based Linux distribution with a modified Gnome Shell interface, icons and GTK Theme.
It is charged up with penetration testing tools and other useful applications for general purposes.


Permanent link to this article: http://www.darknessgate.com/2014/11/02/seanux/

Spring 2014 Lectures & Videos – Offensives computer security course

This page contains all the lecture Lecture Slides and youtube videos for the Spring 2014 semester of this course. http://www.cs.fsu.edu/~redwood/OffensiveComputerSecurity/lectures.html

Permanent link to this article: http://www.darknessgate.com/2014/11/02/spring-2014-lectures-videos-offensives-computer-security-course/

Permanent link to this article: http://www.darknessgate.com/2014/11/01/exif-jpeg-header-manipulation-tool/

Permanent link to this article: http://www.darknessgate.com/2014/10/31/exiftool/


AfterLife permits the collection of physical memory contents from a system after a warm or cold reboot. The tool is an extension of the msramdump utility by Wesley McGrew that adds forensic features and some functionality. In addition to providing a self-contained memory acquisition environment on a USB drive or a CD/USB combination, AfterLife is also …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/10/19/afterlife/

Kernel Exchange EDB Viewer

Kernel Exchange EDB Viewer is an advanced and professional software for opening EDB files of MS Exchange Server. Some of the prominent features of the tool include: An EDB explorer tool available to download and use for absolutely free of cost. Assists in opening MS Exchange Server EDB files quickly and flawlessly. A stand-alone tool …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/10/18/kernel-exchange-edb-viewer/

Live View

Live View version 0.7b is a Java-based graphical forensics tool that creates a VMware virtual machine out of a raw (dd-style) disk image or physical disk. This allows the forensic examiner to “boot up” the image or disk and gain an interactive, user-level perspective of the environment, all without modifying the underlying image or disk. …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/10/18/live-view/

Encrypted Disk Detector

Encrypted Disk Detector (v2 released 04/22/2013) is a command-line tool that can quickly and non-intrusively check for encrypted volumes on a computer system during incident response. The decision can then be made to investigate further and determine whether a live acquisition needs to be made in order to secure and preserve the evidence that would …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/10/18/encrypted-disk-detector-2/

Network and Computer Security

6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department’s Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/10/17/network-computer-security/


FileAlyzer is a tool to analyze files. FileAlyzer allows a basic analysis of files (showing file properties and file contents in hex dump form) and is able to interpret common file contents like resources structures (like text, graphics, HTML, media and PE). Using FileAlyzer is as simple as viewing the regular properties of a file …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/10/15/filealyzer/

Page 5 of 16« First...34567...Last »