Phenomenati
Phenomenati
  • Home
  • Phenomena
    • Predictions from 1998
    • Cyber Entropy™
    • The Cyber Reckoning
    • Risk Discipline
    • InfoSec Maturity Model
    • The 5 What Imperatives™
    • The Decisive SOC
    • A SOC Taxonomy
  • Services
    • Cyber101 for the Board
    • Cyber Risk Assessments
    • Cyber ShadowBreaker™
    • Cybersecurity Strategy
    • Cybersecurity Design
    • Risk Level Agreements
    • SecOps Communications
    • Case Studies
  • Partners
    • Technology Vendors
    • Service Providers
  • About
    • Leadership
    • Contact Us
  • Resource Center
    • Frameworks, Standards
    • Threat Intel & Dashboards
    • Cyber Reconnaissance
    • Vulnerability Management
    • Scanning & Pen Testing
    • Monitoring, IDS, SIEM
    • Analytics
    • Incident Response
    • DFIR Resources
  • More
    • Home
    • Phenomena
      • Predictions from 1998
      • Cyber Entropy™
      • The Cyber Reckoning
      • Risk Discipline
      • InfoSec Maturity Model
      • The 5 What Imperatives™
      • The Decisive SOC
      • A SOC Taxonomy
    • Services
      • Cyber101 for the Board
      • Cyber Risk Assessments
      • Cyber ShadowBreaker™
      • Cybersecurity Strategy
      • Cybersecurity Design
      • Risk Level Agreements
      • SecOps Communications
      • Case Studies
    • Partners
      • Technology Vendors
      • Service Providers
    • About
      • Leadership
      • Contact Us
    • Resource Center
      • Frameworks, Standards
      • Threat Intel & Dashboards
      • Cyber Reconnaissance
      • Vulnerability Management
      • Scanning & Pen Testing
      • Monitoring, IDS, SIEM
      • Analytics
      • Incident Response
      • DFIR Resources
  • Home
  • Phenomena
    • Predictions from 1998
    • Cyber Entropy™
    • The Cyber Reckoning
    • Risk Discipline
    • InfoSec Maturity Model
    • The 5 What Imperatives™
    • The Decisive SOC
    • A SOC Taxonomy
  • Services
    • Cyber101 for the Board
    • Cyber Risk Assessments
    • Cyber ShadowBreaker™
    • Cybersecurity Strategy
    • Cybersecurity Design
    • Risk Level Agreements
    • SecOps Communications
    • Case Studies
  • Partners
    • Technology Vendors
    • Service Providers
  • About
    • Leadership
    • Contact Us
  • Resource Center
    • Frameworks, Standards
    • Threat Intel & Dashboards
    • Cyber Reconnaissance
    • Vulnerability Management
    • Scanning & Pen Testing
    • Monitoring, IDS, SIEM
    • Analytics
    • Incident Response
    • DFIR Resources

Resource Center

A collection of useful Resources for Cyber Security Operations practitioners, or those building/evolving a SOC.

Digital Forensics Suites & Toolkits

The Coroner's Toolkit

Digital Forensics Framework

EnCase

Open Computer Forensics Architecture (OCFA)

Oxygen Forensic Suite

Paladin Forensic Suite

SANS Investigative Forensics Toolkit (SIFT)

The Sleuth Kit (TSK) & Autopsy

X-Ways Forensics

Malware Analysis

CIRCL's Dynamic Malware Analysis

Malwr

Manticore binary analysis

TOTALHASH

Reverse Engineering

Angr

Apktool

BinNavi

Binwalk

Capstone

dex2jar

dotPeek

Frida

ILSpy

Java Decompiler

Miasm

Pin

QEMU

Radare

Snowman

Unicorn

x64dbg

Z3

Evidence Collection

Bulk Extractor

Forensic Imager

Guymager

Disk Imagers

FTK Imager

Computer Online Forensic Evidence Extractor (COFEE)

Memory Imagers

Belkasoft Live RAM Capturer

Linux Memory Grabber

Magnet RAM Capture

OSForensics

Memory Analysis

Evolve

KnTList

LiME

Memoryze

Rekall

Responder PRO

Volatility

WindowsSCOPE

Miscellaneous Resources

Aw Snap Site Cleaning

Cellebrite UFED

DEFT

HELIX3

HxD hex editor

Llibforensics

P2 eXplorer

PlainSight

ProDiscover Basic

Registry Recon

USB Historian

Volatility

Xplico

Xry

Copyright © 2023 Phenomenati - All Rights Reserved.


This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

DeclineAccept