Skip to content

Digital Forensic Intelligence (DFINT)

Notifications You must be signed in to change notification settings

3v1lW1th1n/My-Forensics

 
 

Repository files navigation

https://github.com/mikeroyal/Digital-Forensics-Guide
https://github.com/Cugu/awesome-forensics
https://github.com/enaqx/awesome-pentest
https://forensics.wiki
https://github.com/onlurking/awesome-infosec
https://www.forensicscijournal.com


FORENSICS TOOLS

FLOSS
• Kali Linux
https://www.kali.org/docs/general-use/kali-linux-forensics-mode
• CAINE
https://www.caine-live.net
• CSI Linux
https://csilinux.com
• Debian Forensics Packages
https://packages.debian.org/unstable/forensics-all
• Drive Badger
https://drivebadger.com

PROPRIETARY
• SIFT Workstation
https://www.sans.org/tools/sift-workstation
• GMDSOFT
https://www.gmdsoft.com/
• NirSoft
https://www.nirsoft.net/computer_forensic_software.html
• MiTeC
https://www.mitec.cz/
• FTK® - Forensic Toolkit
https://www.exterro.com/forensic-toolkit
• Cyber Arm
https://cyber-arm.com/services/
• Verint Systems
https://www.verint.com
• NSO Group
https://www.nsogroup.com/

MOBILE PHONE FORENSICS

PROPRIETARY
• Cellebrite
https://cellebrite.com
• MSAB
https://www.msab.com
• Octoplus Box
https://octoplusbox.com https://octoplusbox.com/en/features/models/

FLOSS
• Avilla Forensics
https://github.com/AvillaDaniel/AvillaForensics
• IPED
https://github.com/sepinf-inc/IPED
• Mobile Verification Toolkit (MVT)
https://docs.mvt.re/en/latest

OTHERS
• Forensics Journal Comparative analysis of mobile forensic proprietary tools: an application in forensic investigation (2022)
https://www.forensicscijournal.com/articles/jfsr-aid1039.pdf
• Methodology for Forensics Data Reconstruction on Mobile Devices with Android Operating System Applying In-System Programming and Combination Firmware (2020)
https://ppee.unb.br/wp-content/uploads/2020/12/Artigo_Claudinei-Morim.pdf
• OWASP Mobile Application Security
https://mas.owasp.org
https://mobile-security.gitbook.io/mobile-security-testing-guide
https://github.com/OWASP/owasp-mastg

WINDOWS RELATED

https://www.hirensbootcd.org/download

https://docs.microsoft.com/en-us/sysinternals/downloads

https://github.com/keydet89/RegRipper3.0

-under work-

https://github.com/AvillaDaniel/AvillaForensics

https://github.com/sepinf-inc/IPED

https://ericzimmerman.github.io/#!index.md

https://www.misp-project.org

https://github.com/imagej/ImageJ

https://www.autopsy.com/download/

https://www.nomoreransom.org/en/index.html

https://github.com/504ensicsLabs

VOLATILE MEMORY ANALYSIS

• Volatility
https://www.volatilityfoundation.org/releases
• Linux Memory Extractor (LiME)
https://github.com/504ensicsLabs/LiME
• Cobalt Strike in memory
https://andreafortuna.org/2020/11/22/how-to-detect-cobalt-strike-activity-in-memory-forensics/

CRYPTOCURRENCIES ANALYSIS

https://www.chainalysis.com
https://github.com/demining/CryptoDeepTools
https://github.com/demining/bitcoindigger
https://github.com/demining/Dao-Exploit
https://www.blocksherlock.com/home/blockchain-explorers

OSINT

Awesome Osint - https://github.com/jivoi/awesome-osint
Sherlock Project - https://github.com/sherlock-project/sherlock
Name OSINT - https://namechk.com
IP Logger - https://iplogger.org
IP Tracker - https://iplogger.org/ip-tracker
Location Tracker - https://iplogger.org/location-tracker
URL checker - https://iplogger.org/url_checker
MAC address lookup - https://iplogger.org/mac-checker
Rainbow Tables (Hashes) - https://hashes.com/en/decrypt/hash
Message Header Analyzer - https://mha.azurewebsites.net/ | https://github.com/microsoft/MHA
Magic Numbers - https://en.wikipedia.org/wiki/Magic_number_(programming)
Web Cache - https://archive.org
Offensive Google framework - https://github.com/mxrch/GHunt


https://www.youtube.com/watch?v=WwmcZSHw66w
https://www.youtube.com/watch?v=P-OpyGJcMHE
https://www.youtube.com/watch?v=0AwI6YrV2h4

LAW ENFORCEMENT

International Conventions
UNO - https://www.unodc.org/unodc/en/organized-crime/intro/UNTOC.html
Budapest Convention - https://www.coe.int/en/web/cybercrime/the-budapest-convention
Five Eyes - https://en.wikipedia.org/wiki/Five_Eyes
Private Agents
Google - https://lers.google.com/signup_v2/landing
Google Time Line - https://timeline.google.com
Google Takeout - https://takeout.google.com
Microsoft - https://www.microsoft.com/en-us/corporate-responsibility/law-enforcement-requests-report
Whatsapp - https://www.whatsapp.com/records/login
Facebook - https://www.facebook.com/records/login
Uber - https://lert.uber.com/s/?language=en_US

https://www.wired.com/story/duckduckgo-microsoft-twitter-ft-bush-assassination-whatsapp/
https://proprivacy.com/privacy-service/guides/duckduckgo-safe
https://www.reddit.com/r/privacytoolsIO/comments/oonja7/protonmail_working_with_law_enforcement_a_concern/

MALWARES, BACKDOORS, ZERO-DAYS, DATA POISONING, SUPPLY CHAIN ATTACK, MAN-IN-THE-MIDDLE (MITM), HONEY POTS, AND SOCIAL ENGINEERING ATTACK

Case Law
1_dRthFvGk3zqARHOPzAymQQ
• Omerta Digital
https://www.omertadigital.com/
• Case: ANON (also stylized as AN0M or ΛNØM)
https://en.wikipedia.org/wiki/ANOM
https://www.vice.com/en/article/n7b4gg/anom-phone-arcaneos-fbi-backdoor
• Case: EncroChat
https://en.wikipedia.org/wiki/EncroChat
https://eucrim.eu/news/germany-federal-court-of-justice-confirms-use-of-evidence-in-encrochat-cases
https://xperylab.medium.com/the-dark-phones-encrochat-criminals-are-building-their-own-communication-system-474f3aeef759
• Case: Pegasus Spyware (NSO Group)
https://theintercept.com/2021/07/27/pegasus-nso-spyware-security
• Case: Verint
https://wikileaks.org/spyfiles/docs/VERINT_2012_AvneTurn_en.html
https://www.reddit.com/r/InfoSecNews/comments/sxxzju/leaktheanalyst_group_leak_critical_data_from/
• Case: Phantom Secure
https://en.wikipedia.org/wiki/Phantom_Secure
https://www.vice.com/en/article/v7m4pj/the-network-vincent-ramos-phantom-secure
• Case: Sky Global
https://en.wikipedia.org/wiki/Shutdown_of_Sky_Global
• Case: Magic Lantern
• Case: Bundestrojaner
• Case: Cryptophon
https://en.wikipedia.org/wiki/Tron_(hacker)#Cryptophon
APT & Cybercriminal Campagin Collections https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections
Malwares
• Malwares
https://dergipark.org.tr/tr/download/article-file/835902
• CVEs
https://www.cve.org
https://github.com/vdohney/keepass-password-dumper

Man-In-The-Middle
https://github.com/jakev/mitm-helper-wifi
https://github.com/jakev/mitm-helper-vpn

Tor Browser Fingerprint
https://blog.torproject.org/browser-fingerprinting-introduction-and-challenges-ahead/
https://coveryourtracks.eff.org/learn

Forensics Footprints

Supply Chain Attack
https://reproducible-builds.org/

HARDWARE, BIOS AND FIRMWARE ATTACKS

• KeyGrabber Forensic Keylogger
https://www.youtube.com/watch?v=6JJo8qCYE8M
• Installation of beacon implants
https://arstechnica.com/tech-policy/2014/05/photos-of-an-nsa-upgrade-factory-show-cisco-router-getting-implant/
• LegbaCore https://legbacore.com/Research.html
• LightEater Demo: Stealing GPG keys/emails in Tails via remote firmware infection
https://www.youtube.com/watch?v=sNYsfUNegEA

NETWORK ANALYSIS

• Snort - https://github.com/snort3
• Wireshark - https://www.wireshark.org
• NMAP - https://nmap.org

METADATA

• ExifTool - https://github.com/exiftool/exiftool
• PhotoDNA
• Geo-tags

DATA CONVERT, REGISTRY, EVENT LOG, FINDERS

Online
https://www.virustotal.com
https://binvis.io
Offline
Convert to safe PDFs - https://github.com/freedomofpress/dangerzone
ImHex - https://github.com/WerWolv/ImHex
Making Maps for Investigators - https://github.com/northloopforensics/Fetch
Bitlocker Key Finder - https://github.com/northloopforensics/Bitlocker_Key_Finder
Drive Badger - Covert Data Exfiltration Operations - https://github.com/drivebadger/drivebadger

REVERSE ENGINEERING

SOCIAL ENGINEERING ATTACK

OTHERS

https://www.youtube.com/@hitbsecconf/videos
https://necessaryandproportionate.org
https://forensics.wiki/
https://socradar.io/beyond-the-veil-of-surveillance-private-sector-offensive-actors-psoas/
LeakTheAnalyst

About

Digital Forensic Intelligence (DFINT)

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published