Learning Android Forensics, 2nd Edition has been released
The 2nd edition of Learning Android Forensics by Oleg Skulkin, Donnie Tindal and Rohit Tamma has been released. Here is the …
The 2nd edition of Learning Android Forensics by Oleg Skulkin, Donnie Tindal and Rohit Tamma has been released. Here is the …
Weaponized LNK files are not very popular way of distributing malware, but, of course, sometimes they take place. One of a g…
In this talk Chris Davis discuss how to properly reverse engineer many types of PowerShell malware from analyzing dropper do…
ElMouatez Billah Karbab discusses his work at DFRWS EU 2018: …
Malcom is a tool designed to analyze a system’s network communication using graphical representations of network traff…
MantaRay Forensics team converted VirusShare.com 0-337 hash sets to RAW, EnCase and Autopsy format. The new set contains 31,…
This new video is the next episode of “Introduction to Malware Analysis” series. This time Richard Davis shows h…
This Autopsy plugin by Rebecca Anderson won Autopsy Plugin Contest this year at Open Source Digital Forensics Conference (OS…
Marc Rivero López presented a how-to guide that will help you to deploy Cuckoo Sandbox – an open source malware sandbo…
As a continuation of the “Introduction to Malware Analysis” series, this video walks through an analysis of a po…
Login