diff options
author | Malfurious <m@lfurio.us> | 2024-02-22 02:24:24 -0500 |
---|---|---|
committer | Malfurious <m@lfurio.us> | 2024-02-22 02:24:24 -0500 |
commit | 6bd3b3f194d10bca2d8e45a64e94c2e05b8a9d21 (patch) | |
tree | bcab1e8a43ad78c5bcf4d4fafafc4014444b5dcf /docs/forensics | |
parent | b70b491314e5e0fc36372608ab952fba5e0fdb8d (diff) | |
parent | 8711d4946213a87699e6a20f6cd1db57170bf523 (diff) | |
download | lib-des-gnux-6bd3b3f194d10bca2d8e45a64e94c2e05b8a9d21.tar.gz lib-des-gnux-6bd3b3f194d10bca2d8e45a64e94c2e05b8a9d21.zip |
Merge branch 'malf-bitsctf-2024'
* malf-bitsctf-2024:
RSA link to factordb
Consolidate forensics links and add FTKImager and volatility
BITSCTF 2024 results
Diffstat (limited to '')
-rw-r--r-- | docs/forensics/AperiSolve.txt | 2 | ||||
-rw-r--r-- | docs/forensics/CyberChef.txt | 2 | ||||
-rw-r--r-- | docs/forensics/forensics_links.txt | 17 | ||||
-rw-r--r-- | docs/forensics/qr_code_recovery.txt | 1 |
4 files changed, 17 insertions, 5 deletions
diff --git a/docs/forensics/AperiSolve.txt b/docs/forensics/AperiSolve.txt deleted file mode 100644 index d3c6e00..0000000 --- a/docs/forensics/AperiSolve.txt +++ /dev/null @@ -1,2 +0,0 @@ -https://www.aperisolve.fr/ -https://github.com/Zeecka/AperiSolve diff --git a/docs/forensics/CyberChef.txt b/docs/forensics/CyberChef.txt deleted file mode 100644 index 068c417..0000000 --- a/docs/forensics/CyberChef.txt +++ /dev/null @@ -1,2 +0,0 @@ -https://gchq.github.io/CyberChef/ -https://github.com/gchq/CyberChef diff --git a/docs/forensics/forensics_links.txt b/docs/forensics/forensics_links.txt new file mode 100644 index 0000000..e72f578 --- /dev/null +++ b/docs/forensics/forensics_links.txt @@ -0,0 +1,17 @@ +# Online stego solver and image file analyzer +https://www.aperisolve.fr/ +https://github.com/Zeecka/AperiSolve + +# Online visual data transformation pipeline editor +https://gchq.github.io/CyberChef/ +https://github.com/gchq/CyberChef + +# Online QR code recovery tool +https://merricx.github.io/qrazybox/ + +# Read / export from *.ad1 disk images +https://www.exterro.com/digital-forensics-software/ftk-imager + +# Analyze memory dumps (Windows, maybe Linux) +https://www.golinuxcloud.com/analyzing-volatility-memory-dump/ +https://github.com/volatilityfoundation/volatility diff --git a/docs/forensics/qr_code_recovery.txt b/docs/forensics/qr_code_recovery.txt deleted file mode 100644 index 1c89057..0000000 --- a/docs/forensics/qr_code_recovery.txt +++ /dev/null @@ -1 +0,0 @@ -https://merricx.github.io/qrazybox/ |