You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Here, I'll be documenting my experiences, projects, and the knowledge I gain during this 4-week internship. Feel free to explore the code, projects, and any contributions I make during this learning journey. Connect with me to share your insights or collaborate on exciting digital forensics projects!
This script is like a detective for your computer. It looks at what programs are running, especially those using special files. It then asks an expert (VirusTotal) if these files are safe or not. The goal is to catch and report any suspicious or harmful activity on your computer.
A Python-based tool for concealing confidential information within images.embed and extract data seamlessly, adding an extra layer of privacy to your images.
Scenario: Digital Forensics, completed a final report to present findings. Gathered evidence from an iPhone image file. Looking at WiFi and GPS info, photos and conversations, analyzed the evidence and created timestamps using autopsy.
A fork of @evild3ad's Get-UsnJrnlInfo PowerShell Script. Very minor changes for the purpose of a KAPE Module. Gathers information from an extracted $Max file
this repository contains a comprehensive collection of notes on various aspects of digital forensics, designed to serve as a valuable resource for students, professionals, and enthusiasts in the field. The notes cover fundamental concepts, types of digital evidence, email forensics, forensic duplication, and the creation and analysis of forensic im
This repository contains the two projects completed in Auburn University's COMP 6350 (digital forensics) course. Both projects were completed with my project teammates Virginia Hudson and Casey Waid
Meet the Enhanced Version of hfsum! Enjoy an array of customization options and a broader selection of hashing algorithms. Be aware that due to increased functionality, the performance of this CLI-based program might be impacted. If you run into any issues, remember that the portable version is available as an alternative.
THM DESCRIPTION: Get started with Cyber Security in 24 Days - Learn the basics by doing a new, beginner friendly security challenge every day leading up to Christmas.