This module exploits an use after free on Adobe Flash Player. The vulnerability, discovered by Hacking Team and made public on its July 2015 data
This module exploits a buffer overflow on Adobe Flash Player when handling nellymoser encoded audio inside a FLV video, as exploited in the wild on
This module exploits a memory corruption happening when applying a Shader as a drawing fill as exploited in the wild on June 2015. This module
In this article, we delve into RAW Image Forensic with Belkasoft, utilizing Belkasoft Evidence Center to conduct a comprehensive forensic investigation of raw disk images.
Today we will learn how to extract login credentials from a victim, who is running a Windows System. Using this technique, we can see the
DriveClone is a hard disk (HDD) & solid state drive (SSD) cloning and migration software. It is a time & money saver for server migration,
This module exploits a buffer overflow vulnerability related to the ShaderJob workings on Adobe Flash Player. The vulnerability happens when trying to apply a Shader
Comprehensive Guide on Autopsy Tool (Windows) Memory Forensics using Volatility Workbench Comprehensive Guide on FTK Imager Memory Forensics: Using Volatility Framework Forensic Investigation: Shellbags Forensic
Compare It! displays 2 files side by side, with colored differences sections to simplify analyzing. You can move changes between files with single mouse click or