Forensic Reverse

Digital Forensics Masterclass Complete Computer Forensics  eBooks & eLearning

Posted by lucky_aut at July 8, 2024
Digital Forensics Masterclass Complete Computer Forensics

Digital Forensics Masterclass Complete Computer Forensics
Last updated 7/2024
Duration: 6h48m | .MP4 1280x720, 30 fps(r) | AAC, 44100 Hz, 2ch | 2.5 GB
Genre: eLearning | Language: English

Unlocking the Secrets of Cyber Investigations and Evidence Analysis

Mastering Mobile Forensics  eBooks & eLearning

Posted by AlenMiler at May 1, 2017
Mastering Mobile Forensics

Mastering Mobile Forensics by Soufiane Tahiri
English | 30 May 2016 | ASIN: B01DT4D5OG | 318 Pages | AZW3 | 19.68 MB

Digital Forensics and Cyber Crime with Kali Linux Fundamentals  eBooks & eLearning

Posted by naag at July 14, 2017
Digital Forensics and Cyber Crime with Kali Linux Fundamentals

Digital Forensics and Cyber Crime with Kali Linux Fundamentals
MP4 | Video: AVC 1280x720 | Audio: AAC 48KHz 2ch | Duration: 13.5 Hours | 24.6 GB
Genre: eLearning | Language: English

Why is digital forensics so important? In today’s digital world, every organization is bound to be attacked and likely breached by a cyber adversary. Forensics can be used to determine if and how a breach occurred and also how to properly respond.

Digital Forensics for Pentesters - Hands-on  eBooks & eLearning

Posted by lucky_aut at Jan. 20, 2022
Digital Forensics for Pentesters - Hands-on

Digital Forensics for Pentesters - Hands-on
Duration: 8h 1m | .MP4 1280x720, 30 fps(r) | AAC, 44100 Hz, 2ch | 4.08 GB
Genre: eLearning | Language: English

Learn Digital forensic as it applies to pentesting and conducting a digital forensic investigative response.

Belkasoft Evidence Center 2020 version 9.7.4265  Software

Posted by scutter at Oct. 23, 2019
Belkasoft Evidence Center 2020 version 9.7.4265

Belkasoft Evidence Center 2020 version 9.7.4265 | 1.2 Gb

The Belkasoft product team is pleased to announce the availability of Belkasoft Evidence Center 2020 version 9.7 is an all-in-one forensic solution for acquiring, locating, extracting, and analyzing digital evidence stored inside computers and mobile devices, RAM and cloud.

Mastering Mobile Forensics  eBooks & eLearning

Posted by readerXXI at April 24, 2017
Mastering Mobile Forensics

Mastering Mobile Forensics
by Soufiane Tahiri
English | 2016 | ISBN: 1785287818 | 317 Pages | True PDF | 16 MB

This book aims to provide the forensic community an in-depth insight into mobile forensic techniques when it comes to deal with recent smartphones operating systems.

Learning Linux Binary Analysis  eBooks & eLearning

Posted by AlenMiler at Feb. 24, 2019
Learning Linux Binary Analysis

Learning Linux Binary Analysis by Ryan "elfmaster" O'Neill
English | February 29, 2016 | ISBN: 1782167102 | 282 pages | AZW3 | 1.30 Mb

Digital Forensics for Pentesters - Hands-on  eBooks & eLearning

Posted by lucky_aut at Feb. 11, 2023
Digital Forensics for Pentesters - Hands-on

Digital Forensics for Pentesters - Hands-on
Last updated 2023-02-06
Duration: 08:14:31 | .MP4 1280x720, 30 fps(r) | AAC, 44100 Hz, 2ch | 4.2 GB
Genre: eLearning | Language: English [Auto]

Learn Digital forensic as it applies to pentesting and conducting a digital forensic investigative response.

Mastering Malware Analysis (Repost)  eBooks & eLearning

Posted by DZ123 at Sept. 20, 2023
Mastering Malware Analysis (Repost)

Amr Thabet, "Mastering Malware Analysis: A malware analyst's practical guide to combating malicious software, APT, cybercrime, and IoT attacks, 2nd Edition"
English | 2022 | ISBN: 1803240245 | PDF | pages: 573 | 39.2 mb

Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats  eBooks & eLearning

Posted by First1 at June 16, 2019
Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats

Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats by Alex Matrosov, Eugene Rodionov, Sergey Bratus
English | May 7th, 2019 | ISBN: 1593277164 | 448 pages | EPUB (True/Retail Copy) | 41.00 MB

Rootkits and Bootkits will teach you how to understand and counter sophisticated, advanced threats buried deep in a machine's boot process or UEFI firmware.