|
Such inputs have sequences of identical bytes in the same order, although bytes ... A complete explanation of CTPH can be found in Identifying almost identical ...
http://ssdeep.sourceforge.net/
popularity:
hash
security
hashing
fuzzy
forensics
software
tools
opensource
tool
forensic
|
|
Reference site listing open source digital forensic and incident response tools. ... Copyright © 2003-2007 by Brian Carrier. www.opensourceforensics.org ...
similarity:
popularity:
forensics
security
tools
opensource
forensic
linux
software
computer
windows
reference
|
|
sleuthkit.org is the official web site for The Sleuth Kit and Autopsy Browser. ... Copyright © 2003-2010 by Brian Carrier. http://www.sleuthkit.org ...
similarity:
popularity:
forensics
security
linux
tools
recovery
software
opensource
unix
forensic
sysadmin
|
|
Open source on-the-fly disk encryption software for Windows XP/2000 and Linux.
similarity:
popularity:
security
encryption
software
opensource
tools
cryptography
windows
linux
freeware
privacy
|
![]() |
KeePass is an open source password manager. Passwords can be stored in highly-encrypted databases, which can be unlocked with one master password or key file.
similarity:
popularity:
security
password
software
opensource
tools
freeware
windows
encryption
utilities
passwords
|
|
No information avaiable
similarity:
popularity:
forensics
security
livecd
linux
tools
forensic
opensource
software
distro
ubuntu
|
|
Privacy-Preserving Location Tracking of Lost or Stolen Devices ... result of recent academic research started at the University of Washington, with ...
similarity:
popularity:
security
laptop
software
opensource
tracking
tools
stolen
theft
privacy
recovery
|
![]() |
The Metasploit Framework is the open source penetration testing framework with the world's largest database of public, tested exploits.
similarity:
popularity:
security
hacking
tools
exploit
software
network
opensource
hack
exploits
linux
|
|
Download for Snort, an open source network intrusion prevention and detection ... Click the rules button for more information on the rulesets available on Snort.org ...
similarity:
popularity:
security
network
opensource
software
linux
tools
ids
snort
networking
sysadmin
|
|
Network protocol analyzer for Windows and Unix that allows examination of data from a live network, or from a capture file on disk.
similarity:
popularity:
network
security
tools
sniffer
software
networking
opensource
ethereal
wireshark
windows
|
|
Group of security professionals dedicated to learning the tools, tactics, and motives of the blackhat community and sharing those lessons learned.
similarity:
popularity:
security
honeypot
network
hacking
tools
honeynet
research
software
opensource
forensics
|