Sponsor Links |
Soft Name |
|
Steganalysis of JPEG Images : Breaking the F5 Algorithm |
|
In this paper, we present a steganalytic method that can reliably detect messages (and estimate t... Soft Directory:Group Releases |
|
Anti-Forensics - slides |
|
Covers, encryption, stenography use and detection, hiding collections of pictures, disk wiping - ... Soft Directory:Group Releases |
|
Guide on Managing and Auditing IT Vulnerabilities |
|
The guide recommends specific management practices to help an organization achieve and sustain hi... Soft Directory:Group Releases |
|
MojoPac - Transform any Portable Storage Device Into Your Secure, Personal Computer |
|
MojoPac can turn any USB 2.0 compliant portable storage device, including your iPod, or your USB ... Soft Directory:Group Releases |
|
Fear the Metasploit Framework |
|
The Metasploit Project is one of the most popular penetration testing suites available. If youre ... Soft Directory:Group Releases |
|
Shellcodes for Linux, *BSD, SUN, etc. |
|
Resourceful archive of tools, projects, and related documents. Soft Directory:Group Releases |
|
Map and Details on All CERTs in Europe |
|
It is beyond doubt that the Computer Emergency Response Teams (CERTs) play a significant role in ... Soft Directory:Group Releases |
|
Netwox - a Network Toolbox Containing 222 Tools |
|
Toolbox netwox helps to find and solve network problems : - sniff, spoof - clients, servers - DNS... Soft Directory:Group Releases |
|
Network-Level Polymorphic Shellcode Detection Using Emulation |
|
As state-of-the-art attack detection technology becomes more prevalent, attackers are likely to e... Soft Directory:Group Releases |
|
A Benchmark Suite for Behavior-Based Security Mechanisms |
|
This paper presents a benchmark suite for evaluating behavior-based security mechanisms. Behavior... Soft Directory:Group Releases |
|