You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
Left4Code
a8159b46d2
|
3 weeks ago | |
---|---|---|
Blockchain Forensics | 3 weeks ago | |
Common Types of Steganography & Detection | 3 weeks ago | |
Data Acquisition | 3 weeks ago | |
Filesystem Imaging & hashing | 3 weeks ago | |
Logfile Locations on Win & Lin, & Reading Logfiles | 3 weeks ago | |
Memory Analysis | 3 weeks ago | |
Metadata Forensics | 3 weeks ago | |
Network Forensics | 3 weeks ago | |
Putting Together a Timeline & Report | 3 weeks ago | |
LICENSE | 3 weeks ago | |
README.md | 3 weeks ago |
README.md
L4C_Forensics_CTF
This will in the future contain many Linux Forensics CTF challenges that can be completed by using the skills learned in the digital forensics section of left4code.neocities.org