Breaking Full Disk Encryption
Full Disk Encryption (FDE) may be rather useful as a defense mechanism against potential theft of a computer system. However…
Full Disk Encryption (FDE) may be rather useful as a defense mechanism against potential theft of a computer system. However…
Guys, we have created a Telegram group, where we will do our best to answer all your questions. We will be very happy if you…
Eric Zimmerman has updated most of his tools: WxTCmd, Hasher, Timeline Explorer, ShellBags Explorer, AppCompa…
Eric Zimmerman has released another amazing tool – VSCMount. Now we have “a simple way to mount Volume Shadow Co…
In this post Harlan Carvey shows that most known methods used for forensicating Volume Shadow copies no longer work with Win…
No two insider threat investigations are ever the same—but a standardized process can help them run more smoothly. When you …
Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP …
Blazescan is a Linux webserver malware scanning and incident response tool, with built in support for cPanel servers, but wi…
A new version of the most popular forensic timelining tool, Plaso, has been released. Here is the list of noteworthy updates…
Brett Shavers has published his cheat sheet on how to you X-Ways Forensics. If you still haven’t checked it, it’…
Login