Hash Verification
Intro to Files, Filesystems, and Disks
Password Cracking
PDF Forensics
Reddit Analysis Tool
Basic Analysis of Web Browsing Activity
Malicious Website Analysis
Data Acquisition with dd
Building a VM from a dd image
BEViewer 1.3
Bulk Extractor v1.2
Disk Forensics Concepts
Disk Scanner
File Carving with Foremost
File Carving with Magic Numbers
Image Ripper
Pattern Matching with grep
Raw Disk Image to Virtual Machine
Scalpel
Extundelete
File Filtering Using Hashsets
File Signature Analysis
md5deep & hashdeep
NTFS Compression & File Recovery/Carving
OS Forensics Tools
TSK & Autopsy
Malware SSL using Burp
Android SDK Manager
Introduction & Installation of Santoku
tcpdump 4.3.0
Computer Networking & Protocols
Intro to Network Forensics
Intro to VOIP Extraction
Intro to Wireshark
Network Miner
chrootkit
Intro to OS Layout
Intro to Windows Forensics
Linux Log Analysis
Windows Registry Part 1
Windows Registry Part 2
Windows Registry Part 3
Memory Analysis with Volatility
Steganography/Steganalysis
NIST Hacking Case
Have a Module for this? Submit it here!
Have a Module for this? Submit it here!
Have a Module for this? Submit it here!
Have a Module for this? Submit it here!
Have a Module for this? Submit it here!
Have a Module for this? Submit it here!