Skip to content

Commit

Permalink
fix Misaligned table fence
Browse files Browse the repository at this point in the history
  • Loading branch information
shadawck committed Oct 17, 2019
1 parent 5468210 commit a49a124
Showing 1 changed file with 5 additions and 4 deletions.
9 changes: 5 additions & 4 deletions README.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,6 @@
# [Awesome-anti-forensic](https://github.com/remiflavien1/Awesome-anti-forensic)
[![Awesome](https://awesome.re/badge.svg)](https://github.com/remiflavien1/awesome-anti-forensic)

[![Awesome](https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)](https://github.com/sindresorhus/awesome)

Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attributes. This all includes tools to work with anything in general that makes changes to a system for the purposes of hiding information.

Expand Down Expand Up @@ -44,7 +45,7 @@ Tools and packages that are used for countering forensic activities, including e
| [Hdpram](https://doc.ubuntu-fr.org/hdparm) | get/set hard disk parameters |
| [Imagemounter](https://github.com/ralphje/imagemounter) | Command line utility and Python package to ease the (un)mounting of forensic disk images. |
| [Indxparse](https://github.com/williballenthin/INDXParse) | A Tool suite for inspecting NTFS artifacts. |
| [Interrogate](https://github.com/carmaa/interrogate) | A proof-of-concept tool for identification of cryptographic keys in binary material (regardless of target operating system), first and foremost for memory dump analysis and forensic usage. | |
| [Interrogate](https://github.com/carmaa/interrogate) | A proof-of-concept tool for identification of cryptographic keys in binary material (regardless of target operating system), first and foremost for memory dump analysis and forensic usage. |
| [IOSforensic](https://github.com/Flo354/iOSForensic) | iOS forensic tool https://www.owasp.org/index.php/Projects/OWASP_iOSForensic |
| [IPBA2](https://github.com/PicciMario/iPhone-Backup-Analyzer-2) | IOS Backup Analyzer |
| [Iphoneanalyzer](https://github.com/foreni-packages/iphoneanalyzer) | Allows you to forensically examine or recover date from in iOS device. |
Expand Down Expand Up @@ -76,7 +77,7 @@ Tools and packages that are used for countering forensic activities, including e
| [Pdfid](https://github.com/DidierStevens/DidierStevensSuite/blob/master/pdfid.py) | Scan a file to look for certain PDF keywords. |
| [PdfResurrect](https://github.com/enferex/pdfresurrect) | A tool aimed at analyzing PDF documents. |
| [Peepdf](https://github.com/jesparza/peepdf) | A Python tool to explore PDF files in order to find out if the file can be harmful or not. |
| [Permanent-Eraser](https://github.com/edenwaith/Permanent-Eraser) | Secure file erasing utility for macOS |
| [Permanent-Eraser](https://github.com/edenwaith/Permanent-Eraser) | Secure file erasing utility for macOS |
| [Pev](https://github.com/merces/pev) | Command line based tool for PE32/PE32+ file analysis. |
| [python-evtx](https://github.com/williballenthin/python-evtx) | A tool to parse the Windows XML Event Log (EVTX) format. |
| [Recoverjpeg](https://github.com/samueltardieu/recoverjpeg) | Recover jpegs from damaged devices. |
Expand Down Expand Up @@ -107,7 +108,7 @@ Tools and packages that are used for countering forensic activities, including e
| [Unhide](http://www.unhide-forensics.info/?Linux:Download) | A forensic tool to find processes hidden by rootkits, LKMs or by other techniques. |
| [USBKill](https://github.com/hephaest0s/usbkill) | An anti-forensic kill-switch that waits for a change on your USB ports and then immediately shuts down your computer. |
| [Vinetto](https://sourceforge.net/projects/vinetto/) | A forensics tool to examine Thumbs.db files |
| [Volafox](https://github.com/n0fate/volafox) | macOS Memory Analysis Toolkit. |
| [Volafox](https://github.com/n0fate/volafox) | macOS Memory Analysis Toolkit. |
| [Volatility](https://github.com/volatilityfoundation/volatility) | Advanced memory forensics framework |
| [Wipe](https://github.com/berke/wipe) | A Unix tool for secure deletion |
| [Xplico](https://github.com/xplico/xplico) | Internet Traffic Decoder. Network Forensic Analysis Tool (NFAT). |
Expand Down

0 comments on commit a49a124

Please sign in to comment.