Filerev
Filerev is a powerful tool that helps you easily find and manage hidden files, duplicate files, large files, and oversized folders, ensuring a streamlined and clutter-free digital workspace.
Key features include advanced scanning technology that identifies the unorganized files taking up the most space and cluttering your Google Drive. Filerev enhances productivity by saving time and reducing the frustration of manual file organization. The custom filters and bulk delete tool give you complete control over finding and removing unwanted files in your account. The storage analyzer lets you browse your folders by size to see where the space is being used in your Google Drive.
Whether you're an individual, a small business, or a large enterprise, Filerev offers robust solutions tailored to your needs. Visit filerev.com to discover how Filerev can transform your Google Drive experience and boost efficiency.
Learn more
Digital WarRoom
DWR eDiscovery allows legal professionals to review, process, and produce documents that could be relevant to litigation.
Our Software and hosted Subscriptions offers a wide range of document review tools, including AI search, keyword search, keyword highlight, metadata filtering and marking documents. It also has privilege log, redactions and analysis tools to help users better understand their document corpus. These features can all be done by the user themselves, so they can do the standard eDiscovery tasks without consulting.
DWR eDiscovery offers subscriptions to both hosted and on-prem eDiscovery. DWR Pro desktop software can be downloaded to your computer or server. DWR Pro costs $1995per concurrent use license/year. Cloud subscriptions are charged per-GB for hosting and there are no hidden fees. The entry-level Single Matter subscription costs $10/GB/Month and has a minimum of $250 per month. Private clouds allow multiple matters and multiple users for no more than $4/GB/month moving quickly to $1/GB/month.
Learn more
Awesome Fuzzing
Awesome Fuzzing serves as a comprehensive compilation of resources for those interested in the field of fuzzing, encompassing an array of materials such as books, both free and paid courses, videos, tools, tutorials, and vulnerable applications ideal for hands-on practice to enhance one's understanding of fuzzing and the early stages of exploit development, including root cause analysis. It features instructional videos focused on fuzzing methodologies, essential tools, and recommended practices, alongside conference presentations, tutorials, and blogs dedicated to the subject. Additionally, it includes software tools that facilitate fuzzing of applications, particularly those utilizing network protocols like HTTP, SSH, and SMTP. Users are encouraged to search for and select exploits linked to downloadable applications, where they can then recreate the exploits with their preferred fuzzer. The resource also encompasses a range of tests tailored for fuzzing engines, highlighting various well-known vulnerabilities and providing a corpus of diverse file formats to enable fuzzing across multiple targets found in the existing fuzzing literature. Ultimately, this collection aims to empower learners with the necessary knowledge and skills to effectively engage with fuzzing techniques and develop their expertise in security testing.
Learn more
go-fuzz
Go-fuzz serves as a coverage-guided fuzzing tool designed specifically for testing Go packages, making it particularly effective for those that handle intricate inputs, whether they are textual or binary in nature. This method of testing is crucial for strengthening systems that need to process data from potentially harmful sources, such as network interactions. Recently, go-fuzz has introduced initial support for fuzzing Go Modules, inviting users to report any issues they encounter with detailed descriptions. It generates random input data, which is often invalid, and the function must return a value of 1 to indicate that the fuzzer should elevate the priority of that input in future fuzzing attempts, provided that it should not be stored in the corpus, even if it uncovers new coverage; a return value of 0 signifies the opposite, while other values are reserved for future enhancements. The fuzz function is required to reside in a package that go-fuzz can recognize, meaning the code under test cannot be located within the main package, although fuzzing of internal packages is permitted. This structured approach ensures that the testing process remains efficient and focused on identifying vulnerabilities in the code.
Learn more