IoTDB | by Apache Group
IoTDB by Apache Group Overview IoTDB (Internet of Things Database) is a data management system for time series data, which can provide users specific services, such as, data collection, storage and...
View ArticleInfrastructure testing with MSF | by Karol Mazurek
Infrastructure testing with MSF by Karol Mazurek Penetration testing of the corporate network using Metasploit INTRODUCTION During a full penetration test of the corporate network, you will need many...
View Articlemimikatz | by Benjamin DELPY
mimikatz by Benjamin DELPY mimikatz is a tool I've made to learn C and make somes experiments with Windows security. It's now well known to extract plaintexts passwords, hash, PIN code and kerberos...
View ArticlePortable mobile app traffic analysis | by Christian Kisutsa
Portable mobile app traffic analysis by Christian Kisutsa One of the phases of mobile application pentesting is to analyze network traffic, usually in order to inspect the kind of data exchanged...
View ArticleAndroidUSBCamera | by jiangdongguo
AndroidUSBCamera by jiangdongguo AUSBC Flexible and useful UVC camera engine on Android platform, you can use it to simply open your uvc camera without any system permissions . The only thing you...
View ArticleWeighing the Security Benefits & Drawbacks of Open-Source
These days, open-source software can be found everywhere as innovation is unmatched among organizations. That being said, the accessibility to open-source software creates significant security risks...
View ArticleAndroid-CleanArchitecture | by Fernando Cejsa
Android-CleanArchitecture by Fernando Cejsa Introduction This is a sample app that is part of a blog post I have written about how to architect android application using the Uncle Bob's clean...
View ArticleBeagle | by Omer Yampel
Beagle By Omer Yampel About Beagle Installation Docker Python Package Configuration Web Interface Uploading Data Browsing Existing Graphs Graph Interface Inspecting Nodes and Edges Expanding Neighbours...
View ArticleHow to Integrate Biometric Authentication into Your Mobile App
App developers are always striving to make mobile applications more user-friendly and easier to use. They are in constant search of improvements, and new technologies, such as biometric...
View ArticleHate Speech Models | Natural Language Processing for OSINT & Threat Analysis...
This video tutorial shows how to train the model in order to recognize hate speech sentences. It is a part of our online course 'Natural Language Processing for OSINT & Threat Analysis' by Saeed...
View ArticleTCPFLOW 1.5.0 | by Simson L. Garfinkel
TCPFLOW 1.5.0 by Simson L. Garfinkel Downloads directory: http://digitalcorpora.org/downloads/tcpflow/ Installation Most common GNU/Linux distributions ship tcpflow in their repositories. So on...
View ArticleSQL Introduction | iOS Social Media Forensics [FREE COURSE CONTENT]
In this video tutorial, you will go through an introduction to SQL - what it is, what it is used for, and many more. It is a part of our online course 'iOS Social Media Forensics' by Kinga...
View ArticleKibana | Network Monitoring with Security Onion [FREE COURSE CONTENT]
In this video tutorial, you will go through an introduction to Kibana. It is a part of our online course 'Network Monitoring with Security Onion' by Sivaraman Eswaran. Start now!
View ArticleAudit Dispatcher Plugins | Linux Kernel Security [FREE COURSE CONTENT]
In this video tutorial, you will go through audit dispatcher plugins. It is a part of our online course 'Linux Kernel Security' by Vandana Salve. Start now!
View ArticleIntroduction | Investigate Cyber Fraud - Real-Life Cases [FREE COURSE CONTENT]
In this video tutorial, you will see the introduction to investigating cyber fraud! It is a part of our online course 'Investigate Cyber Fraud - Real-Life Cases' by Jose Alfredo Llerena. Start now!
View ArticleAttacking System Logs and Accounting Files in Linux / Unix | Log files:...
In this video tutorial, you will hear about attacking system logs and accounting files in Linux / Unix! It is a part of our online course 'Log files: Attacks & Defenses' by Ranjitha R. Start now!
View ArticleSherloq | by Guido Bartoli
Sherloq by Guido Bartoli An open source image forensic toolset Introduction "Forensic Image Analysis is the application of image science and domain expertise to interpret the content of an image and/or...
View Articlecode-forensics | by Silvio Montanar
code-forensics by Silvio Montanar code-forensics code-forensics is a toolset for analysing codebases stored in a version control system. It leverages the repository logs, or version history data, to...
View ArticleDisk-Arbitrator | by Aaron Burghardt
Disk-Arbitrator by Aaron Burghardt Introduction Disk Arbitrator is a Mac OS X forensic utility designed to help the user ensure correct forensic procedures are followed during imaging of a disk device....
View ArticleMemory Forensics | Windows Forensics [FREE COURSE CONTENT]
In this video tutorial, you will hear about memory forensics! It is a part of our online course 'Windows Forensics' by Kaan Kaya. Start now!
View Article