Mike Edwards Authentic Jersey  Credentials | 10minemail.info

Category: Credentials

Ail Framework Framework For Analysis Of Information Leaks

AIL Framework – Framework for Analysis of Information Leaks

By administrator 0 Comment August 26, 2019

AIL is a modular framework to analyse potential information leaks from unstructured data sources like pastes from Pastebin or similar services or unstructured data streams. AIL framework is flexible and can be extended to support other functionalities to mine or process sensitive information (e.g. data leak prevention). Features Modular architecture to handle streams of unstructured […]

Tool Which Interfaces With Management Or Administration Applications From An

Tool Which Interfaces with Management or Administration Applications from an Offensive Standpoint

By administrator 0 Comment August 9, 2019

BADministration is a tool which interfaces with management or administration applications from an offensive standpoint. It attempts to provide offsec personnel a tool with the ability to identify and leverage these non-technical vulnerabilities. As always: use for good, promote security, and fight application propagation. Sorry for using python2.7, I found a lot of the vendor […]

Collect, Process, And Hunt With Host Based Data From Macos,

Collect, Process, And Hunt With Host Based Data From MacOS, Windows, And Linux

By administrator 0 Comment August 8, 2019

(pronounced “SKAH-Dee”: similar to Scotty but with a d sound) is a giantess and goddess of hunting in Norse mythology PurposeSkadi is a free, open source collection of tools that enables the collection, processing and advanced analysis of forensic artifacts and images. It works on MacOS, Windows, and Linux machines. It scales to work effectively […]

A Powerful, Easily Deployable Network Traffic Analysis Tool Suite For

A Powerful, Easily Deployable Network Traffic Analysis Tool Suite For Full Packet Capture Artifacts (PCAP Files) And Zeek Logs

By administrator 0 Comment August 5, 2019

Malcolm is a powerful network traffic analysis tool suite designed with the following goals in mind: Easy to use – Malcolm accepts network traffic data in the form of full packet capture (PCAP) files and Zeek (formerly Bro) logs. These artifacts can be uploaded via a simple browser-based interface or captured live and forwarded to […]

A Powerful, Easily Deployable Network Traffic Analysis Tool Suite For

A Powerful, Easily Deployable Network Traffic Analysis Tool Suite For Full Packet Capture Artifacts (PCAP Files) And Zeek Logs

By administrator 0 Comment August 5, 2019

Malcolm is a powerful network traffic analysis tool suite designed with the following goals in mind: Easy to use – Malcolm accepts network traffic data in the form of full packet capture (PCAP) files and Zeek (formerly Bro) logs. These artifacts can be uploaded via a simple browser-based interface or captured live and forwarded to […]

A Powerful, Easily Deployable Network Traffic Analysis Tool Suite For

A Powerful, Easily Deployable Network Traffic Analysis Tool Suite For Full Packet Capture Artifacts (PCAP Files) And Zeek Logs

By administrator 0 Comment August 5, 2019

Malcolm is a powerful network traffic analysis tool suite designed with the following goals in mind: Easy to use – Malcolm accepts network traffic data in the form of full packet capture (PCAP) files and Zeek (formerly Bro) logs. These artifacts can be uploaded via a simple browser-based interface or captured live and forwarded to […]