- Upcoming Events
- Most Viewed Pages
- Featured Events
- Recently Added: Events
- Recently Added: Artifacts
- Recently Added: Documents
- Recently Added: Tools
- Recently Added: Books
Redlight - Pornography Scanner
DFIR Tools
Hot
**NOTE**The download link has disappeared. If you find it, submit it in a comment ...
Eric Zimmerman SDB Explorer
DFIR Tools
Hot
SDB Explorer is a GUI program that allows for interacting with Microsoft Shim data...
DFIR Bloggers
Social Networks
Hot
Last PostBlogURLFeatured | Arsenal Recon Insights | arsenalrecon.com/insights/
Bulk extractor
DFIR Tools
Hot
bulk_extractor is a computer forensics tool that scans a disk image, a file, or a ...
ADS Zone.Identifier
Artifacts
Hot
"With the Advent of XP SP2 when a file1 is downloaded from the internet (i.e. by c...
Cellebrite UFED Pro Series
DFIR Tools
Hot
"Mobile digital data has become critical evidence in criminal cases, adding a sign...
Cellebrite UFED Reader
DFIR Tools
Hot
"Cellebrite's UFED Reader is a free, executable application, purpose-designed for ...
PDF Examiner
DFIR Tools
Hot
Forensic Notes
DFIR Tools
FeaturedHot
The Forensic Notebook will contain all your notes related to the case, timestampe...
Maresware Total
DFIR Tools
Hot
Total performs several useful functions. Use it to: total fields in succeeding rec...
Paraben Corporation
Businesses
Paraben is a digital forensics technology provider specializing in smartphone fore...
DFIR-SQL-Query-Repo
DFIR Tools
Hot
Collection of SQL queries templates for digital forensics use by platform and appl...
Eric Zimmerman Registry Explorer
DFIR Tools
Hot
Registry Explorer is a new approach to interacting with Registry hives. It has sev...
Guidance Software Encase Forensic Imager
DFIR Tools
Hot
"When time is short and you need to acquire entire volumes or selected individual ...
THE CASE OF THE STOLEN SZECHUAN SAUCE
CTFs & Images
Hot
This lab is for learning and practicing forensics! We will be providing training f...
Belkasoft Evidence Center
DFIR Tools
FeaturedHot
"Belkasoft Evidence Center makes it easy for an investigator to search, analyze, s...
Hot
Master the tools and techniques of mobile forensic investigationsConduct mobile fo...
Paraben E3:DS
DFIR Tools
Hot
Mobile forensics is the most dynamic of the digital forensic disciplines. Underst...
AppCompatCache
Artifacts
Hot
"As background, the Application Compatibility Cache is used by the Windows operati...
Paraben E3:Universal
DFIR Tools
Hot
The E3:Universal provides top tier acquisition, analytics, and reporting to optimi...
FeaturedHot
The Definitive Guide to File System Analysis: Key Concepts and Hands-on Techniques...
Last visited MRU
Artifacts
Hot
Tracks the executable and directory location that an application uses to open file...
Hot
An interactive book-and-DVD package designed to help readers master the tools and ...
Hot
Handbook of Digital Forensics and Investigation builds on the success of the Handb...
Arsenal Recon Registry Recon
DFIR Tools
FeaturedHot
Registry Recon is not just another Registry parser. We developed powerful new meth...
Ultimate Registry Forensics Cheat Sheet
Artifacts
FeaturedHot
HUGE collection of registry artifacts related to forensics!
FeatureUsage
Artifacts
Hot
So what does it track and where are forensic artifacts located? It tracks events ...
Unified Logs
Artifacts
Hot
The new Unified Logging and Tracing System for iOS and macOS uses Activity Tracing...
Firefox cookies (Mac)
Artifacts
Hot
Profiles default directory name is randomly generated for each user
Firefox browsing history (Mac)
Artifacts
Hot
Profiles default directory name is randomly generated for each user
Hot
Cyber attacks are currently blooming, as the attackers reap significant profits from...
TOWARDS COMMON EUROPEAN STANDARDS IN ANTIFRAUD ADMINISTRATIVE AND CRIMINAL INVESTIGATIONS
DFIR Resources
Hot
We all know how digital technology has irreversibly changed our daily lives: we no...
Digital Forensics Analysis of Ubuntu Touch on PinePhone
DFIR Resources
Hot
New smartphones made by small companies enter the technology market everyday. Thes...
Transferable Anti-Forensic Attack on Forensic CNNs Using A Generative Adversarial Network
DFIR Resources
Hot
With the development of deep learning, convolutional multimedia forensics for task...
Hot
In today's Industrial IoT (IIoT) environment, where different systems interact wit...
Hot
The challenges faced by organizations in effectively carrying out digital forensic...
A Review of Application Challenges of Digital Forensics
DFIR Resources
The growing preference of automation and digital transformation over semi manual o...
Hot
In the past, digital forensic, with its exploration techniques, are a lane to the ...
Hot
Internet security can be compromised not only through the threat of malware, fraud...
Hot
Forensic analysis and evidence collection for web browser activity is a recurring ...
The Effects of Cyber-Crime on the Growth of Child Pornography and Exploitation: Its Current Regulation and Ways of Improvement
DFIR Resources
Hot
The paper considers the impact of cybercrime on the rise in consumption and creati...
Authentication schemes for Smart Mobile Devices: Threat Models, Countermeasures, and Open Research Issues
DFIR Resources
Hot
This paper presents a comprehensive investigationof authentication schemes for sma...
Hot
As JPEG is widespread de facto image format, Most of the images available in compu...
Medical JPEG image steganography method according to the distortion reduction criterion based on an imperialist competitive algorithm
DFIR Resources
Hot
In most of the digital steganography methods provided for natural digital images, ...
Hot
Nowadays, cloud computing clouded with criminal activities that have caused variou...
Hot
COMPUTER FORENSICS INTEGRATES THE FIELDS OF COMPUTER SCIENCE AND LAW TO INVESTIGAT...
Study of Memory Forensics: Memory Analysis Technique
DFIR Resources
Hot
The emerging world of technology is also becoming a platform for the increase of c...
Digital Forensics Analysis for Network Related Data
DFIR Resources
Hot
With the increase in the field of digital crime anddata theft; the law enforcement...
Hot
In this modern era of computers and mobile phones, where every hand has reach to d...
Face Detection and Recognition for Digital Forensics
DFIR Resources
Hot
Surveillance methods are becoming widely popular in many organizations, including ...
Cloud Forensics: Trends and Challenges
DFIR Resources
Hot
Cloud is no longer a new word to the computingworld and has transformed the IT ind...
Blockchain based Digital Forensics Investigation Framework in the Internet of Things and Social Systems
DFIR Resources
Hot
The decentralized nature of blockchain technologies can well match the needs of in...
Analysis of Virtual Machine in Digital Forensics
DFIR Resources
Hot
With the advancement in virtualizationtechnology, the use of virtual machines has ...
The use of virtual machines to support hands-on learning experiences in undergraduate systemsoriented courses
DFIR Resources
Hot
The Information Technology (IT) academic courses have always been challenged with ...
Face Validation of Database Forensic Investigation Metamodel
DFIR Resources
Hot
Using a face validity approach, this paper provides a validation of the Database F...
Hot
The continuing rise of network security threats and network attacks have motivated...
NewHot
CubexSoft Email Conversion Tools
DFIR Tools
Email conversion, email migration, data migration, email viewers.Zimbra ExportWind...
NewHot
KStrike
DFIR Tools
Stand-alone parser for User Access Logging from Server 2012 and newer systems This...
NewHot
Email Analyzer
DFIR Tools
This tool parses email message sources to extract and display important informati...
NewHot
Zook Email Conversion Tools
DFIR Tools
Email ConversionChoose From a Range of Email Converters Supporting Conversion Betw...
Hot
Name That Hash
DFIR Tools
Have you ever come across a hash such as 5f4dcc3b5aa765d61d8327deb882cf99 and wond...
FeaturedHot
Cyber Triage
DFIR Tools
Cyber Triage provides automated incident response software for fast, comprehensive...
FeaturedHot
Belkasoft X
DFIR Tools
Belkasoft X is an easy-to-use and powerful digital forensics and incident response...
Hot
NSF to PST Converter
DFIR Tools
NSF Converter is a significant software to convert NSF file into Outlook PST forma...
Hot
Lotus Notes to Outlook Converter
DFIR Tools
Two query become mandatory here - how to export Lotus Notes to Outlook or what is ...
Hot
OST to PST Converter
DFIR Tools
How to export OST to PST format? – It can solve with this admirable software that ...
Hot
SQLite queries
DFIR Tools
BrowsersMozilla Firefox 61+:firefox_places.sqlfirefox_favicons.sqlfirefox_formhist...
Hot
WindowsTimeline
DFIR Tools
Works with any ActivitiesCache.db (Windows 1703/1709/1803/1809/1903/1909/2004 ..) ...
Hot
Archive of DEF CON CTF challenges
DFIR Tools
Welcome, hackers. This is a live, playable archive of DEF CON CTF challenges. Brou...
Hot
Hash List Importer
DFIR Tools
This EnScript is designed to read a text file containing one or more hash items an...
Hot
Local Website Archive
DFIR Tools
Local Website Archive offers a fast and easy way to store information from the web...
Hot
Cyotek WebCopy
DFIR Tools
Cyotek WebCopy is a tool for copying full or partial websites locally onto your h...
Hot
WEBSITE DOWNLOADER
DFIR Tools
This tool is to download or copy websites that are currently online. The free ver...
Hot
HTTrack website copier
DFIR Tools
It allows you to download a World Wide Web site from the Internet to a local direc...
Hot
Timeline
DFIR Tools
Timeline is a cross-platform application for displaying and navigating events on a...
Hot
Accent OFFICE Password Recovery
DFIR Tools
to recover passwords of Microsoft Office and OpenOffice/LibreOffice documents
Hot
The skills and tools for collecting, verifying and correlating information from different types of systems is an essential skill when tracking dow...
Hot
The digital revolution over the past several decades has advanced every facet of evidence detection, photography, optimization, and interpretation....
Hot
Digital Forensics Explained, Second Edition covers the full life cycle of conducting a mobile and computer digital forensic examination, including ...
Hot
Security architecture or enterprise information security architecture, as it was originally coined by Gartner back in 2006, has been applied to man...
Hot
Digital forensics has been a discipline of Information Security for decades now. Its principles, methodologies, and techniques have remained consis...
FeaturedHot
The second edition is almost here!The X-Ways Forensics Practitioner's Guide is more than a manual-it's a complete reference guide to the full use o...
Hot
This book is focused on the use of deep learning (DL) and artificial intelligence (AI) as tools to advance the fields of malware detection and ana...
Hot
This book presents the latest advances in machine intelligence and big data analytics to improve early warning of cyber-attacks, for cybersecurity ...
Hot
Developing a knowledge model helps to formalize the difficult task of analyzing crime incidents in addition to preserving and presenting the digita...
PoC or GTFO, Volume 3
Books
Hot
Volume 3 of the PoC || GTFO collection--read as Proof of Concept or Get the Fuck Out--continues the series of wildly popular collections of this ha...