2019.10 Encrypted file system forensics - Introduction (EXT4).2019.11 CRYPTO & DATA ERASURE: After forensic analysis drives should be securely wiped | By Paul Katzoff.2019.11 Challenging Your Forensic Readiness with an Application-Level Ransomware Attack.2019.12 New(ish) Presentation: Poking the Bear - Teasing out Apple's Secrets through Dynamic Forensic Testing and Analysis.2019.12 6 Threat Intelligence Sources That Will Help Enhance Digital Forensics Readiness | By Jonathan Zhang.2019.12 HSTS For Forensics: You Can Run, But You Can't Use HTTP.逆向资源: awesome-reverse-engineering: IDA/Ghidra/圆4dbg/OllDbg/WinDBG/CuckooSandbox/Radare2/BinaryNinja/DynamoRIO/IntelPin/Frida/QEMU/Android安全/iOS安全/Window安全/Linux安全/macOS安全/游戏Hacking/Bootkit/Rootkit/Angr/Shellcode/进程注入/代码注入/DLL注入/WSL/Sysmon/.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |