Third party services
If you use this website to find a reference set for your research, please cite our publication:
Cinthya Grajeda, Frank Breitinger, and Ibrahim Baggili. “Availability of Datasets for digital forensics – and what is missing”. In: Digital Investigation (2017). (Presented at DFRWS 2017, Austin, TX)
Source | Description |
---|---|
Alexa Top Sites | Lists the top sites on the web around the world. The first 50 are free to view. |
CG Society | This website is accessible through a subscription and allows graphic designers, etc. to showcase and market their work. It contains a great variety of 3D graphics one can download for free. |
Creative Crash | This website is accessible through a subscription and allows graphic designers, etc. to showcase and market their work. These are computer generated graphics (3D images), etc. |
District of Columbia Open Data | This website is based on statistics and information about the District of Columbia. Data can be downloaded in different formats (e.g., CSV \& XML) and is open for public use. |
Exploit Database Archive | Archive of exploits, shellcode, and security papers |
Factory Images for Nexus and Pixel Devices | It contains binary image files/firmware for Nexus and Pixel devices. |
F-Secure | Lists the most recently published threat descriptions, with technical details and removal instructions for threats that affect computers and mobile devices. |
Hackmageddon | List of one year of Android malware with linked descriptions to Trend Micro's website |
Hashsets.com | Private databse of hashes consiting of unidentified computer operating system files (MS Windows, Linux, OS X, BSD, Solaris), other common software applications, manufacturer hardware and software drivers, etc. Also, includes hashes from the NSRL. |
McAfee | Searchable threat library. |
National Software Refernce Library (NSRL) | List of over 100 million hashes of applications, test data (files), source code, and executable tools. |
National Vulnerability Database | Databases of security checklists, security related software flaws, misconfigurations, product names, and impact metrics. |
OVAL - Open Vulnerability and Assessment Language | Data Files of all vulnerability, compliance, inventory, and patch definitions for supported platforms |
Open Malware/Offensive Computing | Malware querying database - search for malware and download for free |
Phototampering Gallery | Phototampering throughout history gallery that is curated by Fourandsix Technologies, Inc., providers of the image authentication service at izitru.com. |
Random.org | Random number and string generator |
Samsung Updates | Offers the latest firmware images for Samsung devices. |
Symantec - Worldwide Intelligence Network Environment (WINE) | Collection of telemetry data from over 75 million systems. These are occurrences of all the known host and network-based attacks. Approval is required to access the data. |
Trend Micro | URL scanner for malware |
Virus Total | Scanner - analyzes suspicious files and URLs for malware |
Whois | IP and traceroute scanner |
Wiktionary | Open content dictionaries in many languages. It allows for download of wordlists. |