Launching APOLLO: Creating a Simple Tool for Advanced Forensic Analysis
Last week Sarah Edwards attended MacDevOpsYVR in Vancouver, Canada, and had a talk about her simple tool for advanced forens…
Last week Sarah Edwards attended MacDevOpsYVR in Vancouver, Canada, and had a talk about her simple tool for advanced forens…
Memhunter is an endpoint sensor tool that is specialized in detecing resident malware, improving the threat hunter analysis …
Internet of Things (IoT) devices are increasingly deployed for different purposes such as data sensing, collecting and contr…
Apple’s iOS 12 is the latest iteration in their mobile device software. With each iteration Apple creates new system p…
If you are doing incident response, you must know what MITRE ATT&CK is. As it’s a great guide to threat actors tac…
Teru Yamazaki has posted about how to extract Windows Event Log files from allocated space, Volume Shadow Copies, carve them…
A new book by Chet Hosmer has been released. The book will teach you how to use PowerShell and Python for conducting digital…
Chad Tilbury has writen a post on how to use Eric Zimmerman’s RECmd and its batch files to uncover malware persistence…
The new version of Autopsy has been released. New Features: Adding Data: Hashes can optionally be entered when adding a disk…
JPCERT has released a Volatility plugin called MalConfScan. The plugin can be used to extract configuration data of popular …
Login