List of references for Volume IV - End Point Protection Sections 7-10

Rethinking Honeypots
The Honeynet Project
honeynet.org/project

CanaryTokens
StationX Canary Tokens
https://www.stationx.net/canarytokens/

OpenCanary
OpenCanary
http://docs.opencanary.org/en/latest/index.html
OpenCanary

Canary

Artillery - Binary Defense
Project Artillery

artillery

Honey Drive
HoneyDrive honeypot linux distro
https://bruteforce.gr/honeydrive
HoneyDrive download

Intrusion Detection Systems (IDS) Part 2 - Snort, Suricata, Bro IDS & OpenWIPS-n
Snort
https://www.snort.org/
Suricata

The Bro Network Security Monitor

OpenWIPS-ng
http://openwips-ng.org/

Host-Based Intrusion Detection - OSSEC
Open Source HIDS SECurity

Open Source HIDS SECurity
https://ossec.github.io/downloads.html

Network Analysis - Sguil, Xplico & NetworkMiner
Sguil
http://bammv.github.io/sguil/index.html
Xplico
http://www.xplico.org/
NetworkMiner

Burp proxy

mitmproxy
https://mitmproxy.org/
OWASP Zed Attack Proxy Project
https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project

File Integrity Monitoring (FIM) and Checking Part 1
AFICK (Another File Integrity ChecKer)
http://afick.sourceforge.net/
AIDE (Advanced Intrusion Detection Environment)
http://aide.sourceforge.net/
Osiris

Samhain
http://www.la-samhna.de/samhain/
Windows FIMS
http://www.windowsecurity.com/software/File-integrity-checkers/
ADaudit
https://www.manageengine.com/products/active-directory-audit/windows-file-integrity-monitoring.html
Solar Winds
http://www.solarwinds.com/topics/file-integrity-monitoring
What to include in FIM
https://secludit.com/en/blog/windows-linux-vulnerable-files/

File Integrity Monitoring (FIM) and Checking Part 2 - Tripwire and El Jefe
Tripwire Open Source vs OSSEC : Which Is Right For You?

How To Use Tripwire to Detect Server Intrusions on an Ubuntu VPS

Linux Audit

Lynis Open source auditing

EL JEFE Threat Analysis
https://eljefe.immunityinc.com/
Open Source Tripwire

Tripwire
https://www.tripwire.com/

Network Security Toolkit (NST)
Network Security Toolkit
http://nst.sourceforge.net/nst/
Network Security Toolkit

Security Onion
Security Onion
https://securityonion.net/

Security Information and Event Management Software (SIEM)
AlienVault OSSIM
https://www.alienvault.com/products/ossim

Introduction to Malware and Hacker Hunting
malwareRemoval
http://www.malwareremoval.com/
Am I Infected?

Windows - Farbar Recovery Scanner
How to use Farbar Recovery Scan Tool

Farbar Recovery Scan Tool

Automated Malware Removal Tools
Windows Malicious Removal Tols

Kaspersky
https://support.kaspersky.com/viruses/kvrt2015#downloads
Malwarebytes

superantispyware

HitmanPro

Roguekiller

aswMBR
http://public.avast.com/~gmerek/aswMBR.htm
Anti-Rootkit Downloads
http://www.bleepingcomputer.com/download/windows/anti-rootkit/
RKill

Chocolatey package manager for Windows

Homebrew package manager for macOS

Live Rescue Operating Systems, CDs, and USBs
How to Create a Windows 7 Live CD the Easy Way

Windows To Go

Windows 7 Live CD Fee Download

Gandalf’s Windows 7 PE x86 with updateable USB Apps
http://windowsmatters.com/2015/01/10/gandalfs-windows-7-pe-x86/
Rufus
https://rufus.akeo.ie/
UNetbootin
https://unetbootin.github.io/
Universal USB Installer
http://www.pendrivelinux.com/universal-usb-installer-easy-as-1-2-3/
Hiren’s BootCD
http://www.hirensbootcd.org/download/
FalconFour’s Ultimate Boot CD

SystemRescueCd
http://www.system-rescue-cd.org/Download
Trinity Rescue Kit
http://trinityhome.org/Home/index.php?content=TRINITY_RESCUE_KIT_DOWNLOAD
Hitman pro kickstart

Kaspersky Rescue Disk 10
https://support.kaspersky.co.uk/viruses/rescuedisk
REMnux
https://remnux.org/
SANS Investigative Forensic Toolkit
https://digital-forensics.sans.org/community/downloads
Ironkey w700
http://www.kingston.com/us/usb/bootable/ikw700

Windows - Malware Seek & Destroy - Process Explorer - Part 1
Windows Sysinternals

Process Explorer

Windows - Malware Seek & Destroy - Process Explorer - Part 2
Whois Lookup
https://whois.domaintools.com/
Process Explorer

Windows - Malware Seek & Destroy - Process Tools
Process Hacker
http://processhacker.sourceforge.net/
ShimCacheParser

UserAssistView
http://www.nirsoft.net/utils/userassist_view.html

Windows - Malware Seek & Destroy - Sigcheck
Sigcheck

Windows - Malware Seek & Destroy - Autoruns
Configure a Script to Run Once When a New User Logs On
https://support.microsoft.com/en-us/kb/284193#bookmark-task1
Autoruns
https://technet.microsoft.com/en-gb/sysinternals/bb963902.aspx

Windows - Malware Seek & Destroy - Process Monitor
Processmonitor
https://technet.microsoft.com/en-us/sysinternals/processmonitor

Windows - Malware Seek & Destroy - Network Connections
Whois Lookup
https://whois.domaintools.com
Unhide
http://www.unhide-forensics.info/

Malware Seek & Destroy - Networkx
networx
https://www.softperfect.com/products/networx/

Linux - Malware Seek & Destroy - Sysdig
Sysdig User Guide
https://github.com/draios/sysdig/wiki/Sysdig-User-Guide
Sysdig
http://www.sysdig.org

Linux - Seek & Destroy Malware and Hackers - Csysdig
Sysdig
http://www.sysdig.org
Sysdig Quick Reference Guide
https://github.com/draios/sysdig/wiki/sysdig-quick-reference-guide#wiki-basic-command-list
Sysdig Examples
http://www.sysdig.org/wiki/sysdig-examples/

Linux - Seek & Destroy Malware and Hackers - debsums & unhide
Unhide Forensic Tool
http://www.unhide-forensics.info/

Linux - Malware Seek & Destroy - rkhunter
Rootkit Hunter FAQs
http://rkhunter.cvs.sourceforge.net/viewvc/rkhunter/rkhunter/files/FAQ
The Rootkit Hunter project
http://rkhunter.sourceforge.net/

Linux - Malware Seek & Destroy - Linux - Chkrootkit, Tiger, Clamav & LMD
Linux malware From Wikipedia
https://en.wikipedia.org/wiki/Linux_malware
chkrootkit - locally checks for signs of a rootkit
http://www.chkrootkit.org/
Linux Malware Detect
https://www.rfxn.com/projects/linux-malware-detect/
Install Linux Malware Detect on Linux
http://www.2daygeek.com/install-linux-malware-detect-lmd-on-ubuntu-centos-debian-fedora-mint-rhel-opensuse/
Tiger
http://www.nongnu.org/tiger/
ClamAV
http://www.clamav.net/
Linux Security Review
http://www.av-comparatives.org/wp-content/uploads/2015/05/avc_linux_2015_en.pdf

Linux - Malware Seek & Destroy - Linux - Persistence Part 2
SysVinit to Systemd
https://fedoraproject.org/wiki/SysVinit_to_Systemd_Cheatsheet
Debian system initialization
https://www.debian.org/doc/manuals/debian-reference/ch03.en.html

Linux - Malware Seek & Destroy - Linux - Persistence Part 3
Debian system initialization
https://www.debian.org/doc/manuals/debian-reference/ch03.en.html

Mac - Malware Seek & Destroy - Task Explorer
TaskExplorer
https://objective-see.com/products/taskexplorer.html

Mac - Malware Seek & Destroy KnockKnock, BlockBlock & KextViewer
KnockKnock
https://objective-see.com/products/knockknock.html
KextViewr
https://objective-see.com/products/kextviewr.html
BlockBlock
https://objective-see.com/products/blockblock.html

Mac, Linux & Windows - OSquery
osquery
https://osquery.io/
osquery documentation
https://osquery.readthedocs.io/en/stable/
File Integrity Monitoring
https://osquery.readthedocs.io/en/stable/deployment/file-integrity-monitoring/
YARA Scanning
https://osquery.readthedocs.io/en/stable/deployment/yara/
osquery
https://github.com/facebook/osquery
example configuration
https://github.com/facebook/osquery/blob/master/tools/deployment/osquery.example.conf
YARA pattern matching
https://virustotal.github.io/yara/
GRR Rapid Response
https://github.com/google/grr
TLS endpoint for osquery configurations
https://github.com/heroku/windmill

Firmware Rootkits – Seek and Destroy Part 1
Kaspersky Lab Discovers Equation Group
http://usa.kaspersky.com/about-us/press-center/press-releases/2015/kaspersky-lab-discovers-equation-group-crown-creator-cyber-espi
Open-source hardware
https://en.wikipedia.org/wiki/Open-source_hardware
Intelligence Services Might Use the Internet of Things
https://www.theguardian.com/technology/2016/feb/09/internet-of-things-smart-home-devices-government-surveillance-james-clapper
Powerful backdoor/rootkit found preinstalled on 3 million Android phones
http://arstechnica.com/security/2016/11/powerful-backdoorrootkit-found-preinstalled-on-3-million-android-phones/
NSA ANT catalog
https://nsa.gov1.info/dni/nsa-ant-catalog/firewalls/
Hacking Team Uses UEFI BIOS Rootkit
http://blog.trendmicro.com/trendlabs-security-intelligence/hacking-team-uses-uefi-bios-rootkit-to-keep-rcs-9-agent-in-target-systems/
hacker presentation on Hacking the Extensible Firmware Interface
https://www.blackhat.com/presentations/bh-usa-07/Heasman/Presentation/bh-usa-07-heasman.pdf
Summary of Attacks Against BIOS and Secure Boot and related CHIPSEC modules at DEFCON 22
https://www.youtube.com/watch?v=QDSlWa9xQuA

Firmware Rootkits – Seek and Destroy Part 2
VirusTotal
https://www.virustotal.com
Virustotal output example
https://www.virustotal.com/en/file/8b1ec36a50683db137d3bd815052dd6034697af8ef2afd6c81c912b6d0f0f2e0/analysis/
Putting the spotlight on firmware malware
http://blog.virustotal.com/2016/01/putting-spotlight-on-firmware-malware_27.html
darwindumper
https://bitbucket.org/blackosx/darwindumper
chipsec manual
https://github.com/chipsec/chipsec/blob/master/chipsec-manual.pdf
Coperinicus BIOS dump tool
https://www.blackhat.com/docs/us-13/US-13-Butterworth-BIOS-Security-Code.zip
flashrom
https://flashrom.org/Flashrom
UEFI firmware parser
https://pypi.python.org/pypi/uefi_firmware
CHIPSEC: Platform Security Assessment Framework
https://github.com/chipsec/chipsec
UEFI Innovations for Platform Security
https://firmware.intel.com/sites/default/files/SF11_EFIS002_100.pdf

End-Point-Protection Recovery and Remediation Technology
Instant Restore Software Solutions
http://horizondatasys.com/
Macrium Reflect Free
http://www.macrium.com/reflectfree.aspx
Carboncopy cloner
https://bombich.com/
DriveImage XML
http://www.runtime.org/driveimage-xml.htm
Clonezilla
http://clonezilla.org/
Acronis True Image
http://www.acronis.com/en-gb/
Terabyteunlimited - Image for Windows & Linux
https://www.terabyteunlimited.com/products.htm

Encrypted Backup and Cloud Storage
How To Use the ownCloud One-Click Install Application
https://www.digitalocean.com/community/tutorials/how-to-use-the-owncloud-one-click-install-application
How To Install and Configure Seafile on an Ubuntu 12.04 VPS
https://www.digitalocean.com/community/tutorials/how-to-install-and-configure-seafile-on-an-ubuntu-12-04-vps
How To Host a File Sharing Server with Pydio on Ubuntu 14.04
https://www.digitalocean.com/community/tutorials/how-to-host-a-file-sharing-server-with-pydio-on-ubuntu-14-04
How To Set Up a Tahoe-LAFS Distributed Filesystem on Ubuntu 14.04 Servers
https://www.digitalocean.com/community/tutorials/tahoe-lafs
Seafile
https://www.seafile.com/en/home/
ownCloud providers
https://owncloud.org/providers/
Simple Secure Storage Service (S4)
https://leastauthority.com/product_s4/
TurnKey linux ownCloud
https://www.turnkeylinux.org/owncloud
Secure File Sharing
https://pydio.com/
Tahoe Least-Authority File Store
https://www.tahoe-lafs.org/trac/tahoe-lafs
SparkleShare
https://www.sparkleshare.org/
Syncany
https://www.syncany.org/
Syncthing
https://syncthing.net/
Boxcryptor
https://www.boxcryptor.com/en
Drobo
http://www.drobostore.com/
Qnap
https://www.qnap.com/en/

Hardening Standards
CIS Benchmarks. - (Center For Internet Security)
https://benchmarks.cisecurity.org/downloads/benchmarks/
Free Security Benchmark
https://benchmarks.cisecurity.org/downloads/multiform/
Membership for academic/educational institutions
https://benchmarks.cisecurity.org/membership/academic-institutions/
The United States Government Configuration Baseline (USGCB)
https://usgcb.nist.gov/usgcb_content.html
Defence Information Systems Agency - STIGs - Security Template Implementation guide.
http://iase.disa.mil/stigs/Pages/index.aspx
STIG viewer
http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx
CIS Configuration Assessment Tool CIS - CAT
https://benchmarks.cisecurity.org/downloads/audit-tools/documents/CIS-CATUsersGuide_000.pdf

OpenSCAP
The Security Content Automation Protocol (SCAP)
https://scap.nist.gov/
OpenSCAP
https://www.open-scap.org/download/
Debian OVAL
https://www.debian.org/security/oval/
CISCO OVAL
https://oval.cisecurity.org/repository/download
NIST Special Publications
http://csrc.nist.gov/publications/PubsSPs.html
OpenSCAP
https://www.open-scap.org/
OpenSCAP Security Compliance
https://www.open-scap.org/features/security-compliance/
OpenSCAP Vulnerability Assessment
https://www.open-scap.org/features/vulnerability-assessment/
Customizing SCAP Security Guide
https://www.open-scap.org/resources/documentation/customizing-scap-security-guide-for-your-use-case/
OpenSCAP How to Evaluate DISA STIG
https://static.open-scap.org/openscap-1.2/oscap_user_manual.html#_how_to_evaluate_disa_stig

Baseline Auditing
Linux Audit

OpenVAS
http://www.openvas.org/about.html
Nessus Professional

Nessus Home

Qualys FreeScan

Lynis Open source auditing

Windows - Hardening
Harden Windows 7 for Security
http://hardenwindows7forsecurity.com
Harden Windows 8 for Security
http://hardenwindows8forsecurity.com
Harden Windows 10 - A Security Guide
http://hardenwindows10forsecurity.com/
CIS Benchmarks. - (Center For Internet Security)
https://learn.cisecurity.org/benchmarks
The United States Government Configuration Baseline (USGCB)
https://usgcb.nist.gov/usgcb_content.html
Defence Information Systems Agency - STIGs - Security Template Implementation guide
http://iase.disa.mil/stigs/Pages/index.aspx

Windows - Security Compliance Manager (SCM)
Microsoft Security Guidance
https://blogs.technet.microsoft.com/secguide/
Microsoft Security Compliance Manager
https://www.microsoft.com/en-us/download/details.aspx?id=53353
LGPO.exe – Local Group Policy Object Utility
https://blogs.technet.microsoft.com/secguide/2016/01/21/lgpo-exe-local-group-policy-object-utility-v1-0/
Microsoft Baseline Security Analyzer MBSA for windows
https://www.microsoft.com/en-gb/download/details.aspx?id=7558
Policy Analyzer
https://blogs.technet.microsoft.com/secguide/2016/01/22/new-tool-policy-analyzer/
Attack surface analyiser 1.0
https://blogs.microsoft.com/microsoftsecure/2012/08/02/attack-surface-analyzer-1-0-released/
Attack surface analyiser
https://www.microsoft.com/en-us/download/details.aspx?id=24487

Mac – Hardening
Mac OS X Security Configuration Guide
http://www.apple.com/support/security/guides/
Operating System Hardening
http://docs.hardentheworld.org/OS/index.html
Lockdown
https://objective-see.com/products/lockdown.html
CIS Benchmarks for Mac
https://benchmarks.cisecurity.org/downloads/browse/index.cfm?category=benchmarks.os.unix.osx
Defence Information Systems Agency - STIGs - Security Template Implementation guide for Mac
http://iase.disa.mil/stigs/os/mac/Pages/mac-os.aspx

Linux – Hardening
OpenSCAP Security Guide
https://www.open-scap.org/security-policies/scap-security-guide/
Securing Debian Manual
https://www.debian.org/doc/manuals/securing-debian-howto/
Compare Security Frameworks
https://grsecurity.net/compare.php
Kernel Self Protection Project
https://kernsec.org/wiki/index.php/Kernel_Self_Protection_Project
AppArmor
https://en.wikipedia.org/wiki/AppArmor
grsecurity
https://grsecurity.net/features.php
SELinux
http://selinuxproject.org/page/Main_Page
CIS Benchmarks. - (Center For Internet Security)
https://learn.cisecurity.org/benchmarks
The United States Government Configuration Baseline (USGCB)
https://usgcb.nist.gov/usgcb_content.html
Defence Information Systems Agency - STIGs - Security Template Implementation guide.
http://iase.disa.mil/stigs/Pages/index.aspx

Security Focused Operating Systems
Security-focused operating system From Wikipedia (Most are dead)
https://en.wikipedia.org/wiki/Security-focused_operating_system
Tails - For security, privacy and anonymity. Protection from local forensics
https://tails.boum.org/
Whonix workstation and gateway. A focus on anonymity and preventing leaks out of the Tor network.
https://www.whonix.org/
Qubes OS - Security through isolation and compartmentalization implemented using virtualization
https://www.qubes-os.org/
Whonix OS + Qubes OS - security through isolation and compartmentalization. Privacy and anonymity.
https://www.whonix.org/wiki/Qubes
Subgraph OS - Security, privacy and anonymity.
https://subgraph.com/sgos/index.en.html
Parrot Security OS - Security GNU/Linux distribution designed with cloud pentesting and IoT security in mind.
https://www.parrotsec.org/
Hardened Gentoo Linux - With grsecurity and PaX
https://wiki.gentoo.org/wiki/Project:Hardened
Astra Linux - Russian Linux-based secure operating system
https://en.wikipedia.org/wiki/Astra_Linux
Trisquel OS
https://trisquel.info/en/wiki/documentation
Debian - Good general use OS with a security focus
https://www.debian.org/
Arch Linux - Good general use OS with a security focus.
https://www.archlinux.org/
OpenBSD - Good general use OS with a security focus.
https://www.openbsd.org/
Mempo - Looks interesting but nothing happening
https://rawgit.com/mempo/mempo-websites/master/mempo-main/html/index.html

Secure File Deletion - Mechanical drives
OS X Yosemite: Securely erasing your deleted files
https://support.apple.com/kb/PH18638?locale=en_US&viewlocale=en_US
Recuva
http://www.filehippo.com/download_recuva
Eraser
http://eraser.heidi.ie/
File Shredder
http://www.fileshredder.org/

Secure File Deletion - Solid Sate Drives
Recovering Evidence from SSD Drives in 2014: Understanding TRIM, Garbage Collection and Exclusions
https://articles.forensicfocus.com/2014/09/23/recovering-evidence-from-ssd-drives-in-2014-understanding-trim-garbage-collection-and-exclusions/
Reliably Erasing Data From Flash-Based Solid State Drives
https://www.usenix.org/legacy/events/fast11/tech/full_papers/Wei.pdf
SSD and eMMC Forensics 2016
https://articles.forensicfocus.com/2016/04/20/ssd-and-emmc-forensics-2016/
Security of Data on Disk
https://www.youtube.com/watch?v=4SSSMi4X_mA
EXTRA BITS - Data Security and Flash Memory
https://www.youtube.com/watch?v=HQWFCDN9VZI

Evidence Elimination - CCleaner and Bleachit
CCleaner
https://www.piriform.com/ccleaner
BleachBit
http://bleachbit.sourceforge.net
Winapp2
http://www.winapp2.com/
The site has moved since to https://github.com/MoscaDotTo/Winapp2/
Winapp2.ini
http://bleachbit.sourceforge.net/documentation/winapp2_ini

Evidence Elimination - Virtual Memory, Swap, RAM Memory Cache and Buffer
Force Windows 7 to Clear Virtual Memory Pagefile at Shutdown
http://helpdeskgeek.com/windows-7/force-windows-7-to-clear-virtual-memory-pagefile-at-shutdown/
Paging File Info
https://veracrypt.codeplex.com/wikipage?title=Paging%20File
How to disable and re-enable hibernation on a computer that is running Windows
https://support.microsoft.com/en-us/kb/920730
Windows - Disbale Memory Dump Files
https://veracrypt.codeplex.com/wikipage?title=Memory%20Dump%20Files
Mac - Instruction to disable swap here
http://osxdaily.com/2010/10/08/mac-virtual-memory-swap/
Mac - How to disable virtual memory / swap files
http://hints.macworld.com/article.php?story=20040809191855264
Linux - How to Clear RAM Memory Cache, Buffer and Swap Space
http://www.tecmint.com/clear-ram-memory-cache-buffer-and-swap-space-on-linux/
How to disable virtual memory in Windows 7
https://www.youtube.com/watch?v=TuEUR7Kz2ro

Disk Wiping - Mechanical Drives
OS X Yosemite: Securely erasing your deleted files
https://support.apple.com/kb/PH18638?locale=en_US&viewlocale=en_US
How To Securely Wipe Your Hard Drive with DBAN – Erase Your Data for Good
https://tiptopsecurity.com/how-to-securely-wipe-your-hard-drive-with-dban-erase-your-data-for-good/
How To Wipe a Hard Drive
https://www.lifewire.com/how-to-wipe-a-hard-drive-2624527
Eraser
http://eraser.heidi.ie/
File Shredder
http://www.fileshredder.org/
CCleaner
https://www.piriform.com/ccleaner
BleachBit
https://www.bleachbit.org/
DBAN Data Wiping Software
http://www.dban.org
Parted Magic
http://partedmagic.com/
Drive eRazer Ultra Multi-function device that completely erases all data from a hard drive
http://www.cru-inc.com/products/wiebetech/wiebetech_drive_erazer_ultra/
Hard Drive Degausser
http://www.ebay.com/bhp/hard-drive-degausser

Disk Wiping - Solid State Drives (SSD)
Ten Reasons to Buy Self-Encrypting Drives
https://www.trustedcomputinggroup.org/wp-content/uploads/10-Reasons-to-Buy-SEDs_Sept.2010.pdf
Commonly Asked Questions and Answers on Self-encrypting Drives

Scrubbing EXIF & Metadata Part 1 - Introduction
Flickr meets Google Maps
https://loc.alize.us/
Metadata ruins Google’s anonymous eBay Australia protest
http://www.theregister.co.uk/2008/05/30/metadata_ruins_google_accc_filing/
The views of Iraq you weren’t supposed to see
https://www.salon.com/2007/05/18/cpa_documents/
The 13 Most Embarrassing Web Moments
http://www.pcworld.com/article/127823/EmbarrassingMoments.html
Geotagging poses security risks
https://www.army.mil/article/75165/Geotagging_poses_security_risks/
Busted! FBI led to Anonymous hacker after he posts picture of girlfriend’s breasts online
http://www.dailymail.co.uk/news/article-2129257/Higinio-O-Ochoa-III-FBI-led-Anonymous-hacker-gir
BatchPurifier™ 7.2
http://www.digitalconfidence.com/BatchPurifier-Supported.html

Scrubbing EXIF & Metadata Part 2 - Tools
ExifTool can Read, Write and/or Create files in the following formats
http://www.sno.phy.queensu.ca/~phil/exiftool/#supported
View and remove Exif online
http://www.verexif.com/en/
Remove EXIF from image files
https://www.toolsrepo.com/privacy/remove-exif-from-image-files
ExifTool by Phil Harvey
http://www.sno.phy.queensu.ca/~phil/exiftool/
Hidden Data Detector
http://www.digitalconfidence.com/Hidden-Data-Detector.html
BatchPurifier
http://www.digitalconfidence.com/BatchPurifier.html
Doc Scrubber Analyze and scrub hidden and potentially embarrassing data in Word documents.
https://www.brightfort.com/docscrubber.html#
Exiv2 is a C++ library and a command line utility to manage image metadata.
http://www.exiv2.org/
JPEG & PNG Strippe
http://www.steelbytes.com/?mid=30%20-%20JPG%20and%20PNG%20stripper
pdfparanoia
https://github.com/kanzure/pdfparanoia
ImageOptim
https://imageoptim.com/mac
MAT: Metadata Anonymisation Toolkit
https://mat.boum.org/

Scrubbing EXIF & Metadata Part 3 - Guidance
How To Turn off Geotagging in Android
http://www.ubergizmo.com/how-to/turn-off-geotagging-android/
How to turn off geotagging for photos iphone ipad
http://www.techbout.com/turn-off-geotagging-for-photos-iphone-ipad-8738/
The views of Iraq you weren’t supposed to see
https://www.salon.com/2007/05/18/cpa_documents/
How to Remove The Hidden Personal Information Microsoft Office Adds to Your Documents
http://www.howtogeek.com/180849/how-to-remove-the-hidden-personal-information-microsoft-office-adds-to-your-documents/
ImageMagick®
http://www.imagemagick.org/script/index.php

Sensor Noise Camera Identification
Associating cameras with users and objects in a social networking system US 20150124107 A1
https://www.google.com/patents/US20150124107
Cyanogen
http://www.cyanogenmod.org/
site has moved to
https://cyngn.com/
ObscuraCam: Secure Smart Camera
https://guardianproject.info/apps/obscuracam/
Camera Fingerprint - Matlab implementation
http://dde.binghamton.edu/download/camera_fingerprint/
Sensor Noise Camera Identification: Countering Counter-Forensics
http://ws2.binghamton.edu/fridrich/Research/EI7541-29.pdf