recentpopularlog in

forensics

« earlier   
Welcome – W3Challs Hacking Challenges
Hacking Challenges: binary pwnables, web hacking, reverse engineering, crypto & forensics. No simulation. No Guessing.
challenge  challenges  cryptography  ctf  exploit  forensics  hacking  pwnable  pwning  realistic  reversing  security  shellcoding  vulnerability  wargame 
8 days ago by jgraham20
PowerShell Incident Response: Psrecon
Some of the features are:
Collect data on remote host to send the over Email / Push to Share / Pass Additional Arguments
Basic incident response
Integration with the SIEM to alert of any compromise
Remote Lockdown and Quarantine
Disable AD Account and Host Lockdown
PSRemoting  Incident_Response  Forensics 
18 days ago by fraabye
Srinivas11789/PcapXray: PcapXray - A Network Forensics Tool - To visualize a Packet Capture offline as a Network Diagram including device identification, highlight important communication and file extraction
Given a Pcap File, plot a network diagram displaying hosts in the network, network traffic, highlight important traffic and Tor traffic as well as potential malicious traffic including data involved in the communication.
Network  Forensics  Graphing  Analysis  PCAP 
18 days ago by fraabye
aforensics/HiddenVM: HiddenVM — Use any desktop OS without leaving a trace.
HiddenVM is an innovation in computing privacy.

Imagine you're entering a country at the airport. The border agents seize your laptop and force you to unlock it so that they can violate your privacy, treat you like a criminal, and insult your humanity. Is that the world you want to live in?

Whether you use Windows, macOS or Linux, now there's a tech solution for better privacy: HiddenVM.
linux  security  vm  privacy  forensics  tails  macOS 
19 days ago by pivic
aforensics/HiddenVM: HiddenVM — Use any desktop OS without leaving a trace.
HiddenVM — Use any desktop OS without leaving a trace. - aforensics/HiddenVM
privacy  security  vm  linux  forensics  tails 
23 days ago by fmjrey
aforensics/HiddenVM: HiddenVM — Use any desktop OS without leaving a trace.
HiddenVM is an innovation in computing privacy.

Imagine you're entering a country at the airport. The border agents seize your laptop and force you to unlock it so that they can violate your privacy, treat you like a criminal, and insult your humanity. Is that the world you want to live in?

Whether you use Windows, macOS or Linux, now there's a tech solution for better privacy: HiddenVM.

HiddenVM is a simple, one-click, free and open-source Linux application that allows you to run Oracle's open-source VirtualBox software on the Tails operating system.

This means you can run almost any OS as a VM inside the most anti-forensic computing environment in the world. Works where Tails does.

The VM will even connect to full-speed pre-Tor Internet by default, while leaving the Tor connection in Tails undisturbed.

To ensure anti-forensic deniability of your VMs, you can place your persistent HiddenVM installation - containing all VirtualBox binaries, VMs, and HiddenVM itself - in a hidden VeraCrypt volume, and only mount it in the amnesic Tails.

If you set it up correctly, when your computer is turned off all anyone can plausibly see is a blank Tails USB and a 'wiped' hard drive full of meaningless data, or a default booting decoy OS in a partition that you can create.

How does it feel to have no trace of your entire operating system - whether it's Windows, macOS or Linux - ever touch your hard drive? Now you can find out.

HiddenVM: insanely private!
forensics  security  privacy  linux  vm 
23 days ago by RBarnard
Introduction to computer forensics - DEV Community 👩‍💻👨‍💻
Let's take a look to Linux computer forensics.. Tagged with security, linux.
type:article  computer  forensics 
23 days ago by endorama
GitHub - aforensics/HiddenVM: HiddenVM — Use any desktop OS without leaving a trace.
HiddenVM — Use any desktop OS without leaving a trace. - aforensics/HiddenVM
security  linux  vm  privacy  forensics 
24 days ago by geetarista

Copy this bookmark:





to read