Tag Archive: Freeware

Windows ShellBag Parser (sbag)

sbag is a Windows registry parser that targets the Shellbag subkeys to pull useful directory and file artifacts to help identify user activity. There are binaries available for Windows, Linux and Mac OS-X. The Windows version allows one to parse hives resident from a live system. As background, the ShellBag information is a set of …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/11/11/windows-shellbag-parser-sbag/

Registry Decoder

Accurate, efficient analysis of the Windows registry Registry Decoder provides a single tool in which to perform browsing, searching, analysis, and reporting of registry hive contents. All functionality is exposed through an intuitive GUI interface and accommodates even novice investigators. Registry Decoder also acts as a great resource for new research and experimenting within the …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/11/11/registry-decoder/

ForensicUserInfo

ForensicUserInfo will extract the following information: RID Login Name Name Description User Comment LM Hash NT Hash Last Login Date Password Reset Date Account Expiry Date Login Fail Date Login Count Failed Logins Profile Path Groups http://www.woanware.co.uk/forensics/forensicuserinfo.html

Permanent link to this article: http://www.darknessgate.com/2014/11/11/forensicuserinfo/

MDD

MDD is a physical memory acquisition tool for imaging Windows based computers created by the innovative minds at ManTech International Corporation. MDD is capable of acquiring memory images from Win2000, XP, Vista and Windows Server. Download MDD

Permanent link to this article: http://www.darknessgate.com/2014/11/10/mdd/

Link

SEANux is an Ubuntu-based Linux distribution with a modified Gnome Shell interface, icons and GTK Theme.
It is charged up with penetration testing tools and other useful applications for general purposes.

http://seanux.sea.sy/#download

Permanent link to this article: http://www.darknessgate.com/2014/11/02/seanux/

Permanent link to this article: http://www.darknessgate.com/2014/11/01/exif-jpeg-header-manipulation-tool/

Mail Viewer

Viewer for Outlook Express, Windows Mail/Windows Live Mail and Mozilla Thunderbird message databases as well as single EML files. Viewer for standalone files containing Microsoft Outlook Express 4,5 and 6 message database (*.idx/*.mbx/*.dbx), Windows Vista Mail/Windows Live Mail and Mozilla Thunderbird message databases as well as standalone EML files. This application is based on MiTeC …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/10/18/mail-viewer/

FileAlyzer

FileAlyzer is a tool to analyze files. FileAlyzer allows a basic analysis of files (showing file properties and file contents in hex dump form) and is able to interpret common file contents like resources structures (like text, graphics, HTML, media and PE). Using FileAlyzer is as simple as viewing the regular properties of a file …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/10/15/filealyzer/

PEview

PEview provides a quick and easy way to view the structure and content of 32-bit Portable Executable (PE) and Component Object File Format (COFF) files. This PE/COFF file viewer displays header, section, directory, import table, export table, and resource information within EXE, DLL, OBJ, LIB, DBG, and other file types. http://wjradburn.com/software/

Permanent link to this article: http://www.darknessgate.com/2014/10/14/peview/

Process Explorer

The Process Explorer display consists of two sub-windows. The top window always shows a list of the currently active processes, including the names of their owning accounts, whereas the information displayed in the bottom window depends on the mode that Process Explorer is in: if it is in handle mode you’ll see the handles that …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/08/29/process-explorer/

Language-Based Security VT14

After the course, you should be able to apply practical knowledge of security for modern programming languages. This includes the ability to identify application- and language-level security threats, design and argue for application- and language-level security policies, and design and argue for the security, clarity, usability, and efficiency of solutions, as well as implement such …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/08/22/language-based-security-vt14/

Page 3 of 1912345...Last »