Open in app

Sign In

Write

Sign In

Aditya Pratap
Aditya Pratap

49 Followers

Home

About

May 10, 2022

Windows Triaging with Powershell — Part 2: Artifacts Collection

The current blog is in continuation of Part 1 of Windows Triaging with Powershell. Part 1 described how the Powershell functions can be used to parse the Windows Event Logs. …

16 min read

Windows Triaging with Powershell — Part 2: Artifacts Collection
Windows Triaging with Powershell — Part 2: Artifacts Collection

16 min read


Published in OSINT TEAM

·May 7, 2022

Intelligence Gathering with Open-Source Tools

Intelligence gathering is becoming increasingly important to organizations today. In addition to the Internet, they are also using the Deep Web and Dark Web to gather the kind of information that would help them gain an edge over their competitors. But what exactly is intelligence? The term intelligence simply refers…

Osint

13 min read

Intelligence Gathering with Open-Source Tools
Intelligence Gathering with Open-Source Tools
Osint

13 min read


Apr 17, 2022

Windows Triaging with Powershell — Part 1: Parsing Event Logs

This is the part 1 for Triaging a Windows system with Powershell. …

Dfir

12 min read

Windows Triaging with Powershell — Part 1: Parsing Event Logs
Windows Triaging with Powershell — Part 1: Parsing Event Logs
Dfir

12 min read


Jan 5, 2022

Windows Memory Forensics using Open Source Tools

Memory Forensics is forensic analysis of computer’s memory dump, according to Wikipedia. In short, first we have to create the dump of the main memory and then for further analyzing the dump, we use several Dump Analysis tools. Memory Forensics include the both Volatile and Non-Volatile information. For those who…

Memory Forensics

10 min read

Windows Memory Forensics using Open Source Tools
Windows Memory Forensics using Open Source Tools
Memory Forensics

10 min read


Dec 20, 2021

Mobile Lock Cracking/Brute-forcing with AT-Tiny85

For a long time, I’ve been wondering to crack mobile lock screen passwords. Well, with use of many Mobile Forensic Tools and Password Cracking tools that are available in the market does that thing but even commercial software comes with some limitations. So that leads to me search the web…

Password Cracking

8 min read

Mobile Lock Cracking/Brute-forcing with AT-Tiny85
Mobile Lock Cracking/Brute-forcing with AT-Tiny85
Password Cracking

8 min read


Dec 14, 2021

Digital Forensics

The term “Forensics” itself tells that we are going to deal with some evidence that we are supposed to submit in court and also maintaining the integrity of the evidence as well as prepare a detailed documentation about the procedure that is followed. “Digital Forensics” deals with Forensic investigation of evidence including Digital evidence for e.g. Computer, Mobile, DVR, CCTV, USB, E-Mail, Cloud, IoT and list of number of digital media even Play Station, XBOX and Printers etc. There is a standard Forensic procedure we follow throughout our investigation i.e. Identification, Preservation, Collection, Analysis, Documentation and Presentation.

1 min read

1 min read

Aditya Pratap

Aditya Pratap

49 Followers

Cyber World Just for the event {g0ld_digg3r}

Following
  • Steven Curtis

    Steven Curtis

  • Alberto Romero

    Alberto Romero

  • KingdomStarter

    KingdomStarter

  • ODSC - Open Data Science

    ODSC - Open Data Science

  • Saniye Nur

    Saniye Nur

See all (52)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech