Search


Anti-Forensics: Using Veracrypt to Hide Your Most Sensitive Data
Welcome back, my aspiring cyberwarriors! In our industry, we often carry around some very valuable and sensitive data. This might include...
4 min read
2,657 views


Open Source Intelligence (OSINT): OSINT Tools for Bitcoin Investigations
Welcome back, my aspiring OSINT investigators! One of the most lucrative areas for OSINT investigators is the Bitcoin and cryptocurrency...
3 min read
13,228 views


Digital Forensics, Part 8: Live Analysis with sysinternals
Welcome back, my aspiring forensic investigators! In this tutorial, we will use another tool that can be used in for live system...
6 min read
17,534 views


Network Forensics, Part 5: Wi-Fi (802.11) Forensics
Welcome back my aspiring DFIR analysts! In recent recent years, Wi-Fi has become ubiquitous throughout our home and working environments....
4 min read
3,961 views


Digital Forensics: Hackers-Arise Uncovers Mastermind of Global Scam!
As you know, Hackers-Arise offers a service we call Digital Forensic Investigator for Hire. Most of our cases fit into the following...
4 min read
8,331 views


Reverse Engineering Malware, Part 3: IDA Pro Introduction
Welcome back to my Reverse Engineering Malware course! This course is designed for those of you who want to ascend to the pinnacle of...
6 min read
144 views