SYSTEM
WA FORENSICS :: OFFLINE WHATSAPP EVIDENCE INVENTORY :: CHAT EXPORT ANALYSIS :: SHA-256 HASHING :: CYBER REPORTING UI ::
CYBER
SECURITY_TOOLS DEFENSIVE_MODE

CYBER SECURITY TOOLKIT.

A curated defensive cybersecurity tools page for reconnaissance hygiene, log review, malware triage, network inspection, web testing, and incident response workflows.

LIVE_TOOLS
LOCAL PHP UTILITIES
TEXT HASH GENERATOR
FILE HASH GENERATOR

The uploaded file is read from PHP temp storage for hashing. This page does not save it into the project.

ENCODE / DECODE
IOC EXTRACTOR
PASSWORD STRENGTH CHECK
TOOL SAFETY

These utilities are local defensive helpers: hashing, decoding, IOC extraction, and simple quality checks. They do not scan third-party systems or automate exploitation.

For real case work, record the input source, analyst name, timestamp, and resulting hashes in your case notes.

SECURITY_STACK
DEFENSIVE OPERATIONS
// NETWORK
PCAP
TRAFFIC INSPECTION
// WEB
OWASP
APP TESTING GUIDE
// IR
IOC
INDICATOR REVIEW
// HOST
LOGS
EVENT TIMELINES
TOOL_DIRECTORY
LOCAL + OPEN SOURCE
WIRESHARK

Packet capture review, protocol inspection, suspicious connection analysis, and network troubleshooting.

NMAP

Authorized asset discovery and service inventory for your own lab, network, or approved client scope.

BURP SUITE COMMUNITY

Manual web application testing, proxy inspection, request replay, and OWASP learning workflows.

YARA

Pattern-based malware and suspicious file classification using readable detection rules.

SIGMA

Portable log detection rules that can be converted across SIEM and detection platforms.

VOLATILITY

Memory forensics framework for analyzing captured memory images during incident response.

AUTOPSY

Digital forensics platform for disk images, timelines, file metadata, and artifact review.

OSQUERY

Endpoint visibility through SQL-like queries over system state, processes, users, and configuration.

CYBERCHEF

Data transformation workbench for encoding, decoding, hashing, parsing, and investigation notes.

WORKFLOW_MATRIX
WHEN TO USE WHAT
ScenarioTool TypeGoalEvidence Output
Unknown network activityWireshark / ZeekInspect flows, DNS, TLS metadata, protocolsPCAP notes, flow summary, suspicious endpoints
Approved asset inventoryNmapIdentify hosts and exposed services in authorized scopeService list, open ports, version notes
Suspicious fileYARA / CyberChefHash, classify, decode strings, compare indicatorsSHA hashes, rule matches, decoded artifacts
Endpoint investigationOSQuery / SigmaReview processes, persistence, event patternsQuery results, detection matches, timeline
Disk or phone artifact reviewAutopsy / WA ForensicsReview files, metadata, exports, attachmentsReports, inventory, hashes, case notes

Use these tools only on systems, networks, applications, and files where you have authorization. Keep raw evidence read-only and record every transformation.