Security through data

MAIN

  • Home
  • Alerts
  • Blog
  • Events
  • Incidents
  • Tutorials

FEATURED

  • AI
  • Privacy
  • Cryptocurrency
  • Blockchain
  • IoT
  • Deep Web
  • Threat Actors
  • Social Engineering
  • Phishing
  • Malware
  • E-Commerce
  • Deepfake
  • Quantum Computing

COMPANY

  • About us
  • Advertise
  • Legal & Policy
Cybermaterial
  • CATEGORIES
    • Cyber101
      • Definition
      • Quote
    • Document
      • Cheat Sheet
      • Paper
      • Report
    • Education
      • Certification
      • Course
    • Entertainment
      • Documentary
      • Game
      • Meme
      • Movie
      • TV Show
    • Learning
      • Book
      • Lexicon
      • Podcasts
      • Tutorials
    • Tool
      • Hardware
      • Software
No Result
View All Result
Contact Us
Cybermaterial
  • CATEGORIES
    • Cyber101
      • Definition
      • Quote
    • Document
      • Cheat Sheet
      • Paper
      • Report
    • Education
      • Certification
      • Course
    • Entertainment
      • Documentary
      • Game
      • Meme
      • Movie
      • TV Show
    • Learning
      • Book
      • Lexicon
      • Podcasts
      • Tutorials
    • Tool
      • Hardware
      • Software
No Result
View All Result
Contact Us
Cybermaterial
No Result
View All Result

Deft Linux

in Software, Tool
1 min read

DEFT (Digital Evidence & Forensic Toolkit) is a customized distribution of the Ubuntu live Linux CD.

It is an easy-to-use system that includes excellent hardware detection and some of the best open-source applications dedicated to incident response and computer forensics.

 

VISIT SOURCE

Tags: DeftForensic ToolkitLinuxSoftwaretool of the day
31
VIEWS

More Tools

SoK: Cryptojacking Malware
Software

SoK: Cryptojacking Malware

April 20, 2021

This repository contains the cryptojacking malware dataset and relevant information for the "SoK: Cryptojacking Malware" paper.

Snort
Software

Snort

April 15, 2021

Snort is the foremost Open Source Intrusion Prevention System (IPS) in the world. Snort IPS uses a series of rules...

Azure REST API: Access Token Authentication
Software

Azure REST API: Access Token Authentication

April 14, 2021

Azure REST API: Access Token Authentication using PowerShell to perform administrative tasks.

MORE

Movie

Terminator 2: Judgment Day (1991)

September 28, 2020
Alerts

GitHub security update: A bug related to handling of authenticated sessions

March 23, 2021
Alerts

WordPress Plugin NextGen Gallery Patched Severe Vulnerabilities

February 10, 2021
Cybertip

CyberTip: How to properly back up your personal data

January 4, 2021
ADVERTISEMENT

Tags

Books Cybersecurity Hackers Malware Memes Movies Quantum Computing Report Software Word of the day

© 2021 | CyberMaterial | All rights reserved.

SECURITY THROUGH DATA

No Result
View All Result
  • Home
  • Alerts
  • Cyber Incidents
  • Blog
  • Events
  • Tutorials
  • Featured
    • AI
    • Privacy
    • Cryptocurrency
    • Blockchain
    • IoT
    • Deep Web
    • Threat Actors
    • Social Engineering
    • Deepfake
    • E-Commerce
    • Malware
    • Phishing
    • Quantum Computing

© 2020 CyberMaterial - Cyber Decoded.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.