cyberintel.kalymoon.com · 805 articles · updated every 4 hours · grows forever
Alex (@kviddy) has been pushing some extremely useful updates to the open-source Android forensic tool - [ALEAPP](https://github.com/abrignoni/ALEAPP]. Specifically, they introduced modular artifact d…
To determine if you need to collect Random Access Memory on-scene, it is useful to know what kinda of investigation-relevant data is often available in RAM.
kviddy has been pushing some great core updates to ALEAPP. Specifically, artifact scripts are now self-contained. This means that script authors no longer need to update an artifacts list. Instead the…
Come hang out with the nominees for the Forensic 4:Cast “Best DFIR Show of the Year”: 13Cubed, I Beg to DFIR, and DFIR Science!
We often talk about digital forensics in criminal and civil investigations, but a lot of innovation happens in military acquisition and investigations. Join us on August 15th, 2022 as we speak with An…
DFIR Science has launched a new course on learn.dfir.science on how to Collect and Analyze Random Access Memory.
Random Access Memory forensics starts with acquiring RAM from a live (turned on) system. There are several ways to collect the contents of RAM from a computer. Almost all of them require Live Data For…
The DFIR Science YouTube channel was nominated for the 2022 Forensic 4:cast Awards under “DFIR Show of the Year”!
Huge DFIR stream with a lot of Q&A. Check out the chapter times below!
Password cracking often takes a long time. Brute force is normally your last option. But before that, a wordlist usually helps guess the password faster.