Forensics 21
- Speaking at NCCC 2024
- Challenge #9 – Encrypt Them All Case
- Challenge #8 – NTFS File System Case
- Challenge #7 – SysInternals Case
- Linux Forensics Workshop
- Investigating USB Drives using Mount Points Not Drive Letters
- No Drive Letter, No USB Evidence? Think Again!
- Howto Setup and use the CuckooVM v2
- Investigating Windows Systems (Book Review)
- Cuckoo VM for Malware Analysis
- Acquiring Linux Memory using AVML and Using it with Volatility
- Windows InstallTime vs InstallDate Registry Values
- Creating a Hidden Prefetch File to Bypass Normal Forensic Analysis
- Can We Say Farewell to Hiding Malicious EXEs in Stealth ADS
- Anti-Forensics: Leveraging OS and File System Artifacts
- Digital Forensic Challenge #4
- Forensic Analysis: Creating User GUI vs CLI
- Network Forensics Challenge 1
- Disable Automount for SIFT
- الجزء السابع من محاضرات HTID
- شرلوك هولمز الرقمي