Fuzzy Hashing and ssdeep
Such inputs have sequences of identical bytes in the same order, although bytes ... A complete explanation of CTPH can be found in Identifying almost identical ...
http://ssdeep.sourceforge.net/
popularity:
hash
security
hashing
fuzzy
forensics
software
tools
opensource
tool
forensic
|
Open Source Digital Forensics
Reference site listing open source digital forensic and incident response tools. ... Copyright © 2003-2007 by Brian Carrier. www.opensourceforensics.org ...
similarity:
popularity:
forensics
security
tools
opensource
forensic
linux
software
computer
windows
reference
|
The Sleuth Kit & Autopsy: Digital Investigation Tools for Linux and other Unixes
sleuthkit.org is the official web site for The Sleuth Kit and Autopsy Browser. ... Copyright © 2003-2010 by Brian Carrier. http://www.sleuthkit.org ...
similarity:
popularity:
forensics
security
linux
tools
recovery
software
opensource
unix
forensic
sysadmin
|
TrueCrypt - Free Open-Source On-The-Fly Disk Encryption Software for Windows Vista/XP, Mac OS X and Linux
Open source on-the-fly disk encryption software for Windows XP/2000 and Linux.
similarity:
popularity:
security
encryption
software
opensource
tools
cryptography
windows
linux
freeware
privacy
|
KeePass Password Safe
KeePass is an open source password manager. Passwords can be stored in highly-encrypted databases, which can be unlocked with one master password or key file.
similarity:
popularity:
security
password
software
opensource
tools
freeware
windows
encryption
utilities
passwords
|
CAINE Live CD
No information avaiable
similarity:
popularity:
forensics
security
livecd
linux
tools
forensic
opensource
software
distro
ubuntu
|
Adeona: A Free, Open Source System for Helping Track and Recover Lost and Stolen Laptops
Privacy-Preserving Location Tracking of Lost or Stolen Devices ... result of recent academic research started at the University of Washington, with ...
similarity:
popularity:
security
laptop
software
opensource
tracking
tools
stolen
theft
privacy
recovery
|
The Metasploit Project
The Metasploit Framework is the open source penetration testing framework with the world's largest database of public, tested exploits.
similarity:
popularity:
security
hacking
tools
exploit
software
network
opensource
hack
exploits
linux
|
Snort - the de facto standard for intrusion detection/prevention
Download for Snort, an open source network intrusion prevention and detection ... Click the rules button for more information on the rulesets available on Snort.org ...
similarity:
popularity:
security
network
opensource
software
linux
tools
ids
snort
networking
sysadmin
|
Wireshark: Go deep.
Network protocol analyzer for Windows and Unix that allows examination of data from a live network, or from a capture file on disk.
similarity:
popularity:
network
security
tools
sniffer
software
networking
opensource
ethereal
wireshark
windows
|
The Honeynet Project
Group of security professionals dedicated to learning the tools, tactics, and motives of the blackhat community and sharing those lessons learned.
similarity:
popularity:
security
honeypot
network
hacking
tools
honeynet
research
software
opensource
forensics
|