Volatility Workbench – A GUI For Volatility Memory Forensics

Volatility Workbench is a graphical user interface (GUI) for the Volatility tool. Volatility is a command line memory analysis and forensics tool for extracting artifacts from memory dumps. Volatility Workbench is free, open source and runs in Windows.   It provides a number of advantages over the command line version including: No need of remembering […]

Best forensic tools to hide secrets passwords and recover files

Steganography is common term which is used in hiding or encrypting any personal information. The information can be anything which you don’t want to share. The art of hiding personal data, mention cyber forensics experts. Today most of the companies use this techniques to hide sensitive content inside an image. There are various ways of […]

computer hacking forensic investigator

Disclaimer The contributor(s) cannot be held responsible for any misuse of the data. This repository is just a collection of URLs to download eBooks for free. Download the eBooks at your own risks. DMCA take down cannot be possible as we are not republishing the books/infringement of code, but we are just hosting the links […]

Hacking Exposed Computer Forensics,2nd edition

Disclaimer The contributor(s) cannot be held responsible for any misuse of the data. This repository is just a collection of URLs to download eBooks for free. Download the eBooks at your own risks. DMCA take down cannot be possible as we are not republishing the books/infringement of code, but we are just hosting the links […]

CAINE 10.0 – GNU/Linux Live Distribution For Digital Forensics Project, Windows Side Forensics And Incident Response

CAINE (Computer Aided INvestigative Environment) is an Italian GNU/Linux live distribution created as a Digital Forensics project. Currently, the project manager is Nanni Bassetti (Bari – Italy). CAINE offers a complete forensic environment that is organized to integrate existing software tools as software modules and to provide a friendly graphical interface. The main design objectives that CAINE […]

How to become an expert in digital forensics

A review of the interesting work of the experts in digital forensics What exactly does a professional in digital forensics do? In general, experts in digital forensics are computer detectives that collect and analyze evidences of computers, networks and any other type of device with data storage capacities. In their role as Sherlock Holmes, the digital forensics experts will investigate the footprints of the […]

Windows-based Forensic Tools Available for Everyone

Forensic investigations became the “new normal”, as cybercriminals increased their activities at the expense of users and businesses alike. It is sad to admit that cybercrime is set to grow to an estimated $2 trillion black market industry by next year, 2019 according to Juniper Research. Forensic expertise is now one of the top sought-after […]

Hindsight – Internet History Forensics For Google Chrome/Chromium

Hindsight is a free tool for analyzing web artifacts. It started with the browsing history of the Google Chrome web browser and has expanded to support other Chromium-based applications (with more to come!). Hindsight can parse a number of different types of web artifacts, including URLs, download history, cache records, bookmarks, autofill records, saved passwords, […]

Guasap – WhatsApp Forensic Tool

The Guasap Forensic implemented in Python under the GNU General Public License, for the extraction and analysis of files, data bases and logs for forensic WhatsApp. What it does? Check root in device Extract DB and multimedia files (no root) Extract and analyze (deleted messages and others) DB and logs (only root) How to use? […]

Guasap – WhatsApp Forensic Tool

The Guasap Forensic implemented in Python under the GNU General Public License, for the extraction and analysis of files, data bases and logs for forensic WhatsApp. What it does? Check root in device Extract DB and multimedia files (no root) Extract and analyze (deleted messages and others) DB and logs (only root) How to use? […]

Top 7 Most Popular and Best Cyber Forensics Tools

We often watch experts in movies using forensic tools for their investigations but what cyber forensic tools are used by experts? Well, here are top 7 cyber forensic tools preferred by specialists and investigators around the world. “Torture the data and it will confess to anything” Ronald Coase. Cyber forensic: As the title says, it is […]

Extract Forensic Information of Browsers with this Tool Dumpzilla

A team of security experts explained; that this application, Dumpzilla, is developed in Python 3.x and is used with the aim of extracting all forensic information from the Firefox, Iceweasel and Seamonkey browsers. An information security professional also commented that because it is developed in Python 3.x, it may not work correctly in older versions of Python, […]

Forensics report of WordPress hacked site

This post details the forensics performed by Information security trainingprofessional during the clean-up operation. The expert also note specific WordPress security recommendations based on analysis. Background The client had recently registered new domain name, set up some webspace on their VPS and then manually started installing the most recent version of WordPress. Before completing the install […]

Live Forensics Analysis with Computer Volatile Memory

The field of computer Forensics Analysis involves identifying, extracting, documenting, and preserving information that is stored or transmitted in electronic or magnetic form (that is, digital evidence) Forensics Analysis – Volatile Data: The data that is held in temporary storage in the system’s memory (including random access memory, cache memory, and the onboard memory of […]

usbkill – An Anti-Forensic Kill Switch

usbkill is an anti-forensic kill-switch that waits for a change on your USB ports and then immediately shuts down your computer. To run: sudo python usbkill.py or sudo python3 usbkill.py Here are some reasons to use this tool: In case the police or other thugs come busting in (or steal your laptop from you when you […]

Top 7 Cyber Forensic Tools

We often watch experts in movies using forensic tools for their investigations but what cyber forensic tools are used by experts? Well, here are top 7 cyber forensic tools preferred by specialists and investigators around the world. “Torture the data and it will confess to anything” Ronald Coase. Cyber forensic: As the title says, it is […]

Linux Expl0rer – Easy-To-Use Live Forensics Toolbox For Linux Endpoints

Easy-to-use live forensics toolbox for Linux endpoints written in Python & Flask. Capabilities ps View full process list Inspect process memory map & fetch memory strings easly Dump process memory in one click Automaticly search hash in public services VirusTotal AlienVault OTX users users list find Search for suspicious files by name/regex netstat Whois logs […]

Process Doppelgänging Attack Works on all version of Windows Evade AV products and Forensics tools

Security researchers from Endpoint Security firm Ensilo discovered a new Evasion technique dubbed Process Doppelgänging which works with all the versions of windows and can Evade well-known security products forensics tools. Doppelgänging introduced in BLACKHAT EUROPE 2017, with Doppelgänging they load and execute an arbitrary as, like a legitimate process, it is similar to Process […]

Autopsy – A Digital Forensic Tool

The Autopsy is a forensic tool which is used by the military, law enforcement, and corporate examiners to investigate what had happened on a smartphone or a computer. The Autopsy has a plug-in architecture which allows the user to find add-on modules or even develop custom modules written in Java or Python. Main features of […]

fatcat – FAT Filesystems Explore, Extract, Repair, And Forensic Tool

This tool is designed to manipulate FAT filesystems, in order to explore, extract, repair, recover and forensic them. It currently supports FAT12, FAT16 and FAT32. Building and installing You can build fatcat this way: mkdir build cd build cmake .. make And then install it: make install Exploring Using fatcat Fatcat takes an image as […]