Note: The terms in this glossary may have other uses in other fields. The uses discussed here are for general use in computer science & email forensics. EMAIL FORENSICS : Acquisition: The stage in a computer forensic investigation wherein the data involved is collected. Often the means used is a bit-by-bit copy of the … More GLOSSARY : COMPUTER & EMAIL FORENSICS


Is unplugging your Internet connection enough to hide from prying eyes? Certainly Not. Just because you’re offline doesn’t mean your computer or your Smartphone can’t be hacked. Chances are high that you are one of the owners of nearly 100,000 computers around the world in which the National Security Agency has implanted software that enables … More WAYS TO HACK OFFLINE


Digital Forensics & Incident Response is a multidisciplinary profession that focuses on identifying, investigating, and remediating computer network exploitation. This can take varied forms and involves a wide variety of skills, kinds of attackers, kinds of targets. The forms and policies posted on this page are publicly available on the Internet and are good sources … More DFIR RESOURCES


A curated list of awesome Threat Intelligence resources A concise definition of Threat Intelligence: evidence-based knowledge, including context, mechanisms, indicators, implications and actionable advice, about an existing or emerging menace or hazard to assets that can be used to inform decisions regarding the subject’s response to that menace or hazard. Sources Formats Frameworks Tools Research, … More AWESOME THREAT INTELLIGENCE


PENETRATION TESTING CHEAT SHEETS Mobile Application Pentesting: Nmap : Nmap (Not printable): Nmap 5(older version): Nmap 5 (older version, printable)   Java-Deserialization Metasploit Another Metasploit: Powerupsql Scapy HTTP Status codes: Beacon Powershellempire Powersploit PowerUp PowerView Vim Attack Surface Analysis XSS Filter … More INFO-SEC RELATED CHEAT SHEETS