Skip to content Skip to sidebar Skip to footer
blockchain investigation
Orbit: Blockchain Investigation Tool
Orbit is designed to explore network of a blockchain wallet by recursively crawling through transaction history. The data is rendered as a graph to reveal major sources, sinks and suspicious connections. Usage Let's start by crawling transaction history of a wallet python3 -s 1AJbsFZ64EpEfS5UAjAfcUG8pH8Jn3rnOf Crawling multiple wallets is no different. python3…
rootkit hunter
Tyton: Rootkit Hunter
Loadable kernel modules are an important companion of the Linux kernel, LKMs for example. Typically, LKMs are used to add or add extra system calls to support fresh hardware (as device drivers) or file systems. Without LKMs, any predicted functionality must be included in an operating system. When developing a platform to use with everything from a smartphone to a server, this is borderline impossible to do. LKMs provide the kernel and the device user with  extra functionality by extension, and can be safely added or removed when needed or not. Read Also: The…
Trape: Easily Track People On Internet
Trape is a OSINT analysis and research tool created by Github user jofpin, which allows people to track and execute very intelligent social engineering attacks in real time. It was created with the aim of teaching the world how large Internet companies could obtain confidential information such as the status of sessions of their…
Salamandra – Find Spy Bugs Around You Easily
Salamandra is a great tool for detecting and locating spy microphones in different environments. This awesome tool can find microphones based on the strength of the signal sent by the microphone and the amount of noise and overlapped frequencies. With the big boom of Internet of Things (IoT) devices, and some hardware now being banned due…
Twitter investigation - Photo by Joshua Hoehne
Socialbearing – Advanced Search and Analytics for Twitter
Socialbearing is a webpage that offers free advanced search for Twitter accounts with alot of features. Socialbearing is excellent in finding tweets from all Twitter accounts, top retweets for any Twitter handle, searching geolocated tweets, Tweeter maps and much more. Features: Insights & analytics Search by hashtag, website or keyword Advanced search for photos,…
Paros – A java based proxy with amazing features
Paros Proxy includes a number of useful tools for running security tests. These include a web spider, traffic recorder and vulnerability scanner. Paros is excellent for detecting network intrusion openings to some of the most common threats. These include detecting SQL injection attacks and cross-site scripting. Very easy to edit with even rudimentary Java…
Nagios – Traffic monitoring tool and much more
Nagios monitors hosts, systems, and networks, delivering alerts in real-time. Users can specify exactly what they want to be notified of. The program can monitor network services including HTTP, NNTP, ICMP, POP3, and SMTP among others. To many, Nagios is the name in traffic monitoring. A comprehensive, all-bases-covered approach to network management. One of…
PhoneInfoga: Information gathering for phone numbers
One of the most advanced tools to scan phone numbers using only free resources. The goal is to first gather basic information such as country, area, carrier and line type on any international phone numbers with a very good accuracy. Then try to determine the VoIP provider or search for footprints on search engines to…
Ghidra: Software reverse engineering framework by NSA
Ghidra is a software reverse engineering (SRE) framework created and maintained by the National Security Agency Research Directorate. This framework includes a suite of full-featured, high-end software analysis tools that enable users to analyze compiled code on a variety of platforms including Windows, Mac OS, and Linux. Capabilities include disassembly, assembly, decompilation, graphing, and scripting,…
OnionShare: Send and Receive Files Anonymously
OnionShare is an open source tool for securely and anonymously sending and receiving files using Tor onion services. It works by starting a web server directly on your computer and making it accessible as an unguessable Tor web address that others can load in Tor Browserto download files from you, or upload files to you. It…
Security Land follow latest trends and provides news, analysis, security arsenal and education materials for Cybersecurity industry.

© 2021 All Rights Reserved.

Security Land follow latest trends and provides news, analysis, security arsenal and education materials for Cybersecurity industry.

© 2021 All Rights Reserved.

Sign Up to Our Newsletter

Be the first to know the latest updates

Whoops, you're not connected to Mailchimp. You need to enter a valid Mailchimp API key.