Search


Anti-Forensics: Using Veracrypt to Hide Your Most Sensitive Data
Welcome back, my aspiring cyberwarriors! In our industry, we often carry around some very valuable and sensitive data. This might include...
4 min read
2,554 views


Open Source Intelligence (OSINT): OSINT Tools for Bitcoin Investigations
Welcome back, my aspiring OSINT investigators! One of the most lucrative areas for OSINT investigators is the Bitcoin and cryptocurrency...
3 min read
13,193 views

Digital Forensics, Part 8: Live Analysis with sysinternals
Welcome back, my aspiring forensic investigators! In this tutorial, we will use another tool that can be used in for live system...
6 min read
17,447 views

Network Forensics, Part 5: Wi-Fi (802.11) Forensics
Welcome back my aspiring DFIR analysts! In recent recent years, Wi-Fi has become ubiquitous throughout our home and working environments....
4 min read
3,922 views

Digital Forensics: Hackers-Arise Uncovers Mastermind of Global Scam!
As you know, Hackers-Arise offers a service we call Digital Forensic Investigator for Hire. Most of our cases fit into the following...
4 min read
8,305 views

Reverse Engineering Malware, Part 3: IDA Pro Introduction
Welcome back to my Reverse Engineering Malware course! This course is designed for those of you who want to ascend to the pinnacle of...
6 min read
56 views