Quantcast
Channel: Blog – eForensics
Browsing all 378 articles
Browse latest View live

IoTDB | by Apache Group

IoTDB by Apache Group Overview IoTDB (Internet of Things Database) is a data management system for time series data, which can provide users specific services, such as, data collection, storage and...

View Article


Image may be NSFW.
Clik here to view.

Infrastructure testing with MSF | by Karol Mazurek

Infrastructure testing with MSF by Karol Mazurek Penetration testing of the corporate network using Metasploit INTRODUCTION During a full penetration test of the corporate network, you will need many...

View Article


mimikatz | by Benjamin DELPY

mimikatz by Benjamin DELPY mimikatz is a tool I've made to learn C and make somes experiments with Windows security. It's now well known to extract plaintexts passwords, hash, PIN code and kerberos...

View Article

Image may be NSFW.
Clik here to view.

Portable mobile app traffic analysis | by Christian Kisutsa

Portable mobile app traffic analysis by Christian Kisutsa One of the phases of mobile application pentesting is to analyze network traffic, usually in order to inspect the kind of data exchanged...

View Article

Image may be NSFW.
Clik here to view.

AndroidUSBCamera | by jiangdongguo

AndroidUSBCamera by jiangdongguo AUSBC   Flexible and useful UVC camera engine on Android platform, you can use it to simply open your uvc camera without any system permissions . The only thing you...

View Article


Weighing the Security Benefits & Drawbacks of Open-Source

These days, open-source software can be found everywhere as innovation is unmatched among organizations. That being said, the accessibility to open-source software creates significant security risks...

View Article

Image may be NSFW.
Clik here to view.

Android-CleanArchitecture | by Fernando Cejsa

Android-CleanArchitecture by Fernando Cejsa Introduction This is a sample app that is part of a blog post I have written about how to architect android application using the Uncle Bob's clean...

View Article

Image may be NSFW.
Clik here to view.

Beagle | by Omer Yampel

Beagle By Omer Yampel About Beagle Installation Docker Python Package Configuration Web Interface Uploading Data Browsing Existing Graphs Graph Interface Inspecting Nodes and Edges Expanding Neighbours...

View Article


How to Integrate Biometric Authentication into Your Mobile App

  App developers are always striving to make mobile applications more user-friendly and easier to use. They are in constant search of improvements, and new technologies, such as biometric...

View Article


Hate Speech Models | Natural Language Processing for OSINT & Threat Analysis...

  This video tutorial shows how to train the model in order to recognize hate speech sentences. It is a part of our online course 'Natural Language Processing for OSINT & Threat Analysis' by Saeed...

View Article

TCPFLOW 1.5.0 | by Simson L. Garfinkel

TCPFLOW 1.5.0 by Simson L. Garfinkel Downloads directory: http://digitalcorpora.org/downloads/tcpflow/ Installation Most common GNU/Linux distributions ship tcpflow in their repositories. So on...

View Article

SQL Introduction | iOS Social Media Forensics [FREE COURSE CONTENT]

  In this video tutorial, you will go through an introduction to SQL - what it is, what it is used for, and many more. It is a part of our online course 'iOS Social Media Forensics' by Kinga...

View Article

Kibana | Network Monitoring with Security Onion [FREE COURSE CONTENT]

  In this video tutorial, you will go through an introduction to Kibana. It is a part of our online course 'Network Monitoring with Security Onion' by Sivaraman Eswaran. Start now!  

View Article


Audit Dispatcher Plugins | Linux Kernel Security [FREE COURSE CONTENT]

  In this video tutorial, you will go through audit dispatcher plugins. It is a part of our online course 'Linux Kernel Security' by Vandana Salve. Start now!  

View Article

Introduction | Investigate Cyber Fraud - Real-Life Cases [FREE COURSE CONTENT]

  In this video tutorial, you will see the introduction to investigating cyber fraud! It is a part of our online course 'Investigate Cyber Fraud - Real-Life Cases' by Jose Alfredo Llerena. Start now!  

View Article


Attacking System Logs and Accounting Files in Linux / Unix | Log files:...

  In this video tutorial, you will hear about attacking system logs and accounting files in Linux / Unix! It is a part of our online course 'Log files: Attacks & Defenses' by Ranjitha R. Start now!  

View Article

Image may be NSFW.
Clik here to view.

Sherloq | by Guido Bartoli

Sherloq by Guido Bartoli An open source image forensic toolset Introduction "Forensic Image Analysis is the application of image science and domain expertise to interpret the content of an image and/or...

View Article


Image may be NSFW.
Clik here to view.

code-forensics | by Silvio Montanar

code-forensics by Silvio Montanar code-forensics code-forensics is a toolset for analysing codebases stored in a version control system. It leverages the repository logs, or version history data, to...

View Article

Disk-Arbitrator | by Aaron Burghardt

Disk-Arbitrator by Aaron Burghardt Introduction Disk Arbitrator is a Mac OS X forensic utility designed to help the user ensure correct forensic procedures are followed during imaging of a disk device....

View Article

Memory Forensics | Windows Forensics [FREE COURSE CONTENT]

In this video tutorial, you will hear about memory forensics! It is a part of our online course 'Windows Forensics' by Kaan Kaya. Start now!  

View Article
Browsing all 378 articles
Browse latest View live