-
This ticket is to analyze and improve privacy of browser traces (history) of GlobaLeaks embedded.
The goal is to identify possible privacy weakness (such as history items) and to address fixes, so th…
-
For now flags are strings, but it could be great to support regex flags to allow range of answers or multiple flags (more than just case sensitive or not).
noraj updated
7 years ago
-
Link to the tool: https://... (minimum 1 required):
[link] https://github.com/6abd/sentinel [/link]
List of tags separated by comma: tag1,tag2,tag3... (required):
[tags] digital-forensics, for…
-
Can someone explain how the hash assertion for the video file "video/mp4/truepic-20230212-zoetrope.mp4" is generated?
[truepic-20230212-zoetrope.mp4](https://github.com/c2pa-org/public-testfiles/bl…
-
Some of the new electives are missing. Some electives no longer offered are still on the schedule
## AC
- [ ] Make it more apparent when courses are no longer offered
- [ ] Add new electives
- […
-
## NixOS for Pentesting
This represents an effort to bring Security and Forensics software to NixOS, so that it can become a viable alternative to projects like Kali Linux and BlackArch.
Expect up…
-
Now, I get that recuperabit has the most sophisticated recovery algorithm ever.
And with the godsent help of #68 I could even find 31 possible locations for one of my missing photos (of which 5 were…
-
The Facebook app on Windows 10 uses SQLIte databases to store user info. An Autopsy ingest module could parse those databases and create associated artifacts.
See http://computerforensicsblog.champ…
-
Hi.
We're running the test program far below...
Basically ext filesystem on top of vhd...
For our ext vhd, we find that the ext vhd map has gaps in it (we are not sure if there is another bug…
-
**Title: "Revolutionize Your Cloud Defense – Unshackle the Power of Security, Unite with AWS and GCP!"**
In an era dominated by cloud computing, understanding and implementing basic network securit…