- Upcoming Events
- Most Viewed Pages
- Featured Events
- Recently Added: Events
- Recently Added: Artifacts
- Recently Added: Documents
- Recently Added: Tools
- Recently Added: Books
Bulk extractor
DFIR Tools
Hot
bulk_extractor is a computer forensics tool that scans a disk image, a file, or a ...
DFIR Bloggers
Social Networks
Hot
Last PostBlogURLFeatured | Arsenal Recon Insights | arsenalrecon.com/insights/
Redlight - Pornography Scanner
DFIR Tools
Hot
**NOTE**The download link has disappeared. If you find it, submit it in a comment ...
Eric Zimmerman SDB Explorer
DFIR Tools
Hot
SDB Explorer is a GUI program that allows for interacting with Microsoft Shim data...
ADS Zone.Identifier
Artifacts
Hot
"With the Advent of XP SP2 when a file1 is downloaded from the internet (i.e. by c...
DFIR-SQL-Query-Repo
DFIR Tools
Hot
Collection of SQL queries templates for digital forensics use by platform and appl...
PDF Examiner
DFIR Tools
Hot
Guidance Software Encase Forensic Imager
DFIR Tools
Hot
"When time is short and you need to acquire entire volumes or selected individual ...
Cellebrite UFED Reader
DFIR Tools
Hot
"Cellebrite's UFED Reader is a free, executable application, purpose-designed for ...
Medical JPEG image steganography method according to the distortion reduction criterion based on an imperialist competitive algorithm
DFIR Resources
Hot
In most of the digital steganography methods provided for natural digital images, ...
Cellebrite UFED Pro Series
DFIR Tools
Hot
"Mobile digital data has become critical evidence in criminal cases, adding a sign...
Forensic Notes
DFIR Tools
FeaturedHot
The Forensic Notebook will contain all your notes related to the case, timestampe...
THE CASE OF THE STOLEN SZECHUAN SAUCE
CTFs & Images
Hot
This lab is for learning and practicing forensics! We will be providing training f...
Eric Zimmerman Registry Explorer
DFIR Tools
Hot
Registry Explorer is a new approach to interacting with Registry hives. It has sev...
AppCompatCache
Artifacts
Hot
"As background, the Application Compatibility Cache is used by the Windows operati...
Paraben Corporation
Businesses
Paraben is a digital forensics technology provider specializing in smartphone fore...
Maresware Total
DFIR Tools
Hot
Total performs several useful functions. Use it to: total fields in succeeding rec...
Belkasoft Evidence Center
DFIR Tools
Hot
"Belkasoft Evidence Center makes it easy for an investigator to search, analyze, s...
Last visited MRU
Artifacts
Hot
Tracks the executable and directory location that an application uses to open file...
Paraben E3:DS
DFIR Tools
Hot
Mobile forensics is the most dynamic of the digital forensic disciplines. Underst...
Hot
Master the tools and techniques of mobile forensic investigationsConduct mobile fo...
Paraben E3:Universal
DFIR Tools
Hot
The E3:Universal provides top tier acquisition, analytics, and reporting to optimi...
FeaturedHot
The Definitive Guide to File System Analysis: Key Concepts and Hands-on Techniques...
Amcache
Artifacts
Hot
The Amcache.hve is a registry hive file that is created by Microsoft® Windows® to ...
FeaturedHot
This course is an intermediate-level four-day training course, designed for partic...
Event Type
Physical
Start Date
FeaturedHot
Magnet AXIOM Examinations (AX200) is ideal for those who require intermediate-leve...
Event Type
Physical
Start Date
FeaturedHot
Forensic Fundamentals (AX100) is a beginner-level course, designed for participant...
Event Type
Virtual
Start Date
FeaturedHot
Magnet AXIOM Examinations (AX200) is ideal for those who require intermediate-leve...
Event Type
Virtual
Start Date
FeaturedHot
This course is an expert-level four-day training course, designed for participants...
Event Type
Virtual
Start Date
FeaturedHot
MVS21 is happening May 2021 with experts in digital forensics helping you stay cu...
Event Type
Virtual
Start Date
FeaturedHot
This course is an expert-level four-day training course, designed for participants...
Event Type
Virtual
Start Date
FeaturedHot
This course is an expert-level four-day training course, designed for participants...
Event Type
Virtual
Start Date
FeaturedHot
Magnet AXIOM Cyber Examinations (CY200) is ideal for those who require intermediat...
Event Type
Virtual
Start Date
FeaturedHot
Magnet AXIOM Examinations (AX200) is ideal for those who require intermediate-leve...
Event Type
Virtual
Start Date
National Cyber Crime Conference 2021
Event Calendar
NewHot
Welcome to the 2021 National Cyber Crime Conference! Over the past decade, the NCCC has become one of the premier training events for law enforcem...
Start Date
Cyber Triage Demo Webinar - April 21, 2021
Event Calendar
NewHot
We are hosting a live webinar that demonstrates the highlights of Cyber Triage. We hope you can attend. The event will have a 25-minute demo follo...
Start Date
CY200 Magnet AXIOM Cyber Examinations - Tue 24 Aug
Event Calendar
FeaturedHot
Magnet AXIOM Cyber Examinations (CY200) is ideal for those who require intermediate-level training with a digital investigation platform that cover...
Start Date
FeaturedHot
Magnet AXIOM Cyber Examinations (CY200) is ideal for those who require intermediate-level training with a digital investigation platform that cover...
Start Date
FeaturedHot
Magnet AXIOM Cyber Examinations (CY200) is ideal for those who require intermediate-level training with a digital investigation platform that cover...
Start Date
CY200 Magnet AXIOM Cyber Examinations - Tue 15 Jun
Event Calendar
FeaturedHot
Magnet AXIOM Cyber Examinations (CY200) is ideal for those who require intermediate-level training with a digital investigation platform that cover...
Start Date
FeaturedHot
Magnet AXIOM Cyber Examinations (CY200) is ideal for those who require intermediate-level training with a digital investigation platform that cover...
Start Date
CY200 Magnet AXIOM Cyber Examinations - Tue 18 May
Event Calendar
FeaturedHot
Magnet AXIOM Cyber Examinations (CY200) is ideal for those who require intermediate-level training with a digital investigation platform that cover...
Start Date
CY200 Magnet AXIOM Cyber Examinations - Tue 4 May
Event Calendar
FeaturedHot
Magnet AXIOM Cyber Examinations (CY200) is ideal for those who require intermediate-level training with a digital investigation platform that cover...
Start Date
AX350 Magnet AXIOM macOS Examinations - Tue 30 Nov
Event Calendar
FeaturedHot
This course is an expert-level four-day training course, designed for participants who are somewhat familiar with the principles of digital forensi...
Start Date
AX350 Magnet AXIOM macOS Examinations - Tue 28 Sep
Event Calendar
FeaturedHot
This course is an expert-level four-day training course, designed for participants who are somewhat familiar with the principles of digital forensi...
Start Date
FeaturedHot
This course is an expert-level four-day training course, designed for participants who are somewhat familiar with the principles of digital forensi...
Start Date
AX350 Magnet AXIOM macOS Examinations - Tue 3 Aug
Event Calendar
FeaturedHot
This course is an expert-level four-day training course, designed for participants who are somewhat familiar with the principles of digital forensi...
Start Date
AX350 Magnet AXIOM macOS Examinations - Tue 6 Jul
Event Calendar
FeaturedHot
This course is an expert-level four-day training course, designed for participants who are somewhat familiar with the principles of digital forensi...
Start Date
FeaturedHot
This course is an expert-level four-day training course, designed for participants who are somewhat familiar with the principles of digital forensi...
Start Date
FeaturedHot
This course is an expert-level four-day training course, designed for participants who are somewhat familiar with the principles of digital forensi...
Start Date
AX350 Magnet AXIOM macOS Examinations - Tue 22 Jun
Event Calendar
FeaturedHot
This course is an expert-level four-day training course, designed for participants who are somewhat familiar with the principles of digital forensi...
Start Date
AX350 Magnet AXIOM macOS Examinations - Tue 8 Jun
Event Calendar
FeaturedHot
This course is an expert-level four-day training course, designed for participants who are somewhat familiar with the principles of digital forensi...
Start Date
Ultimate Registry Forensics Cheat Sheet
Artifacts
FeaturedHot
HUGE collection of registry artifacts related to forensics!
FeatureUsage
Artifacts
Hot
So what does it track and where are forensic artifacts located? It tracks events ...
Unified Logs
Artifacts
Hot
The new Unified Logging and Tracing System for iOS and macOS uses Activity Tracing...
Firefox cookies (Mac)
Artifacts
Hot
Profiles default directory name is randomly generated for each user
Firefox browsing history (Mac)
Artifacts
Hot
Profiles default directory name is randomly generated for each user
Android Dumpsys Analysis to Indicate Driver Distraction
DFIR Resources
NewHot
Realising a Push Button Modality for Video-Based Forensics
DFIR Resources
NewHot
Complexity and sophistication among multimedia-based tools have made it easy for p...
DIGITAL FORENSICS VS ANTI-DIGITAL FORENSICS TECHNIQUES, LIMITATIONS AND RECOMMENDATIONS
DFIR Resources
NewHot
The number of cyber attacks has increased tremendously in the last few years. This...
NewHot
One of the digital forensics activities has the goal to prove a cybercrime. There ...
Digital investigation of attacks on Ethereum smart contracts
DFIR Resources
NewHot
Programming errors in Ethereum smart contracts can result in catastrophic financia...
A REFINED CYBER CRIME INVESTIGATION PROCESS MODEL TO CATER TRADITIONAL AND DIGITAL FORENSIC INVESTIGATION
DFIR Resources
Hot
This paper identifies the need for a comprehensive digital forensic investigation ...
Magnet Certified Forensics Examiner - IEF
DFIR Resources
FeaturedHot
In order to take the MCFE-IEF course, students must first successfully enroll and ...
Magnet Certified Forensics Examiner Recertification - AXIOM
DFIR Resources
FeaturedHot
Prior to the end of the two-year certification period, students must complete a re...
Magnet Certified Forensics Examiner - AXIOM
DFIR Resources
FeaturedHot
The MCFE certification for Magnet AXIOM will last for 2 years from the date of suc...
Hot
Maximizing the positive effects and minimizing the negative effects of employee mo...
Comparison of data recovery techniques on master file table between Aho-Corasick and logical data recovery based on efficiency
DFIR Resources
Hot
Data recovery is one of the tools used to obtain digital forensics from various st...
Hot
Network covert channels are increasingly used to endow malware with stealthy behav...
Validating of Digital Forensic Images Using SHA-256
DFIR Resources
Hot
Volumes of digital images are produced per time, whiles these digital images may b...
Social Media User Relationship Framework
DFIR Resources
Hot
The use of social media has spread through many aspects of society, allowing milli...
High-Capacity Reversible Data Hiding in Encrypted Images Based on Hierarchical Quad-Tree Coding and Multi-MSB Prediction
DFIR Resources
Hot
Nowadays, more and more researchers are interested in reversible data hiding in en...
Hot
Cyber attacks are currently blooming, as the attackers reap significant profits from...
TOWARDS COMMON EUROPEAN STANDARDS IN ANTIFRAUD ADMINISTRATIVE AND CRIMINAL INVESTIGATIONS
DFIR Resources
Hot
We all know how digital technology has irreversibly changed our daily lives: we no...
Digital Forensics Analysis of Ubuntu Touch on PinePhone
DFIR Resources
Hot
New smartphones made by small companies enter the technology market everyday. Thes...
Transferable Anti-Forensic Attack on Forensic CNNs Using A Generative Adversarial Network
DFIR Resources
Hot
With the development of deep learning, convolutional multimedia forensics for task...
Hot
In today's Industrial IoT (IIoT) environment, where different systems interact wit...
Hot
The challenges faced by organizations in effectively carrying out digital forensic...
A Review of Application Challenges of Digital Forensics
DFIR Resources
The growing preference of automation and digital transformation over semi manual o...
Hot
In the past, digital forensic, with its exploration techniques, are a lane to the ...
Hot
Internet security can be compromised not only through the threat of malware, fraud...
Hot
Forensic analysis and evidence collection for web browser activity is a recurring ...
The Effects of Cyber-Crime on the Growth of Child Pornography and Exploitation: Its Current Regulation and Ways of Improvement
DFIR Resources
Hot
The paper considers the impact of cybercrime on the rise in consumption and creati...
FeaturedHot
Magnet OUTRIDER
DFIR Tools
Get a Head Start on Examinations With Magnet OUTRIDER, you can perform lightning f...
FeaturedHot
Magnet REVIEW
DFIR Tools
Review Evidence from AnywhereSecurely share all digital evidence via a single web-...
FeaturedHot
Magnet IGNITE
DFIR Tools
Magnet IGNITE is a Cloud-Based Early Case Assessment ToolAs a Forensic Service Pro...
FeaturedHot
Magnet AXIOM Cyber
DFIR Tools
Simplify Your InvestigationsAXIOM Cyber is a robust digital forensics and incident...
Hot
BitRecover Free File Viewers
DFIR Tools
Free VHDX ViewerFree DjVu ViewerFree Windows Backup ViewerFree Netscape ViewerFree...
Hot
BitRecover Free Email Tools
DFIR Tools
Free PST ViewerFree OST ViewerFree MBOX ViewerFree Thunderbird ViewerFree Eudora V...
Hot
BitRecover Password Recovery Products
DFIR Tools
PST Password RecoveryPST Unlock WizardUnlock PDF WizardLock PDF WizardAadhaar Card...
Hot
BitRecover File Convert - Email
DFIR Tools
EML to PST WizardMSG to PST WizardMBOX Converter WizardThunderbird WizardBAT Wizar...
Hot
BitRecover Data Backup Software
DFIR Tools
Thunderbird Backup WizardGmail Backup WizardOffice 365 Backup WizardOutlook Webmai...
Hot
Wintriage
DFIR Tools
Wintriage is a live response tool that extracts Windows artifacts. It must be exe...
Hot
CubexSoft Email Conversion Tools
DFIR Tools
Email conversion, email migration, data migration, email viewers.Zimbra ExportWind...
Hot
KStrike
DFIR Tools
Stand-alone parser for User Access Logging from Server 2012 and newer systems This...
Hot
Email Analyzer
DFIR Tools
This tool parses email message sources to extract and display important informati...
Hot
Zook Email Conversion Tools
DFIR Tools
Email ConversionChoose From a Range of Email Converters Supporting Conversion Betw...
Hot
Name That Hash
DFIR Tools
Have you ever come across a hash such as 5f4dcc3b5aa765d61d8327deb882cf99 and wond...
FeaturedHot
Cyber Triage
DFIR Tools
Cyber Triage provides automated incident response software for fast, comprehensive...
Hot
Belkasoft X
DFIR Tools
Belkasoft X is an easy-to-use and powerful digital forensics and incident response...
Hot
NSF to PST Converter
DFIR Tools
NSF Converter is a significant software to convert NSF file into Outlook PST forma...
Hot
Lotus Notes to Outlook Converter
DFIR Tools
Two query become mandatory here - how to export Lotus Notes to Outlook or what is ...
Hot
OST to PST Converter
DFIR Tools
How to export OST to PST format? – It can solve with this admirable software that ...
Hot
SQLite queries
DFIR Tools
BrowsersMozilla Firefox 61+:firefox_places.sqlfirefox_favicons.sqlfirefox_formhist...
Hot
WindowsTimeline
DFIR Tools
Works with any ActivitiesCache.db (Windows 1703/1709/1803/1809/1903/1909/2004 ..) ...
Hot
Archive of DEF CON CTF challenges
DFIR Tools
Welcome, hackers. This is a live, playable archive of DEF CON CTF challenges. Brou...
Hot
Hash List Importer
DFIR Tools
This EnScript is designed to read a text file containing one or more hash items an...
Hot
Local Website Archive
DFIR Tools
Local Website Archive offers a fast and easy way to store information from the web...
Hot
Go deep into the mind of a master hacker as he breaks into a hostile, cloud-based security environment. Sparc Flow invites you to shadow him every...
Hot
Kali is a popular Linux distribution used by security professionals and is becoming an important tool for daily use and for certifications. Penetra...
Hot
Intelligent and Connected Vehicles (ICVs) are moving into the mainstream of the worldwide automotive industry. A lot of advanced technologies, like...
Hot
The skills and tools for collecting, verifying and correlating information from different types of systems is an essential skill when tracking dow...
Hot
The digital revolution over the past several decades has advanced every facet of evidence detection, photography, optimization, and interpretation....
Hot
Digital Forensics Explained, Second Edition covers the full life cycle of conducting a mobile and computer digital forensic examination, including ...
Hot
Security architecture or enterprise information security architecture, as it was originally coined by Gartner back in 2006, has been applied to man...
Hot
Digital forensics has been a discipline of Information Security for decades now. Its principles, methodologies, and techniques have remained consis...
FeaturedHot
The second edition is almost here!The X-Ways Forensics Practitioner's Guide is more than a manual-it's a complete reference guide to the full use o...
Hot
This book is focused on the use of deep learning (DL) and artificial intelligence (AI) as tools to advance the fields of malware detection and ana...