René's URL Explorer Experiment


Title: GitHub - DefenceDev/Digital-Forensics-Guide: Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database Forensics.

Open Graph Title: GitHub - DefenceDev/Digital-Forensics-Guide: Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database Forensics.

X Title: GitHub - DefenceDev/Digital-Forensics-Guide: Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database Forensics.

Description: Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database Forensics. - DefenceDev/Digital-Forensics-Guide

Open Graph Description: Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database Forensics. - DefenceDev/Digital-Forensics-Guide

X Description: Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database Forensics. - DefenceDev/Digital-Forensics-Guide

Opengraph URL: https://github.com/DefenceDev/Digital-Forensics-Guide

X: @github

direct link

Domain: patch-diff.githubusercontent.com

route-pattern/:user_id/:repository
route-controllerfiles
route-actiondisambiguate
fetch-noncev2:7fa19ae5-35f6-7ea0-c26e-d7b40b8003c2
current-catalog-service-hashf3abb0cc802f3d7b95fc8762b94bdcb13bf39634c40c357301c4aa1d67a256fb
request-idB100:14207:407E1E8:534B003:6974E130
html-safe-nonce8cf2dca606cae1305630db34cde43399365bb0d3110d62a600129e46412224be
visitor-payloadeyJyZWZlcnJlciI6IiIsInJlcXVlc3RfaWQiOiJCMTAwOjE0MjA3OjQwN0UxRTg6NTM0QjAwMzo2OTc0RTEzMCIsInZpc2l0b3JfaWQiOiI2NTczMTY1NjI5NzIzMTczMTY4IiwicmVnaW9uX2VkZ2UiOiJpYWQiLCJyZWdpb25fcmVuZGVyIjoiaWFkIn0=
visitor-hmacced13758a63cd13642442c1f489b977f330b1390b5788a02823c2f0f1add906c
hovercard-subject-tagrepository:722277531
github-keyboard-shortcutsrepository,copilot
google-site-verificationApib7-x98H0j5cPqHWwSMm6dNU4GmODRoqxLiDzdx9I
octolytics-urlhttps://collector.github.com/github/collect
analytics-location//
fb:app_id1401488693436528
apple-itunes-appapp-id=1477376905, app-argument=https://github.com/DefenceDev/Digital-Forensics-Guide
twitter:imagehttps://opengraph.githubassets.com/e0687795e8cb46fbab2fc52dec047778b0d4671a525d26d2fd2d1cc6c5bb9f5b/DefenceDev/Digital-Forensics-Guide
twitter:cardsummary_large_image
og:imagehttps://opengraph.githubassets.com/e0687795e8cb46fbab2fc52dec047778b0d4671a525d26d2fd2d1cc6c5bb9f5b/DefenceDev/Digital-Forensics-Guide
og:image:altDigital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database Forensics. - DefenceDev/Digital-Forensics-Guide
og:image:width1200
og:image:height600
og:site_nameGitHub
og:typeobject
hostnamegithub.com
expected-hostnamegithub.com
None4a4bf5f4e28041a9d2e5c107d7d20b78b4294ba261cab243b28167c16a623a1f
turbo-cache-controlno-preview
go-importgithub.com/DefenceDev/Digital-Forensics-Guide git https://github.com/DefenceDev/Digital-Forensics-Guide.git
octolytics-dimension-user_id149995846
octolytics-dimension-user_loginDefenceDev
octolytics-dimension-repository_id722277531
octolytics-dimension-repository_nwoDefenceDev/Digital-Forensics-Guide
octolytics-dimension-repository_publictrue
octolytics-dimension-repository_is_forktrue
octolytics-dimension-repository_parent_id393489989
octolytics-dimension-repository_parent_nwomikeroyal/Digital-Forensics-Guide
octolytics-dimension-repository_network_root_id393489989
octolytics-dimension-repository_network_root_nwomikeroyal/Digital-Forensics-Guide
turbo-body-classeslogged-out env-production page-responsive
disable-turbofalse
browser-stats-urlhttps://api.github.com/_private/browser/stats
browser-errors-urlhttps://api.github.com/_private/browser/errors
release488b30e96dfd057fbbe44c6665ccbc030b729dde
ui-targetcanary-1
theme-color#1e2327
color-schemelight dark

Links:

Skip to contenthttps://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide#start-of-content
https://patch-diff.githubusercontent.com/
Sign in https://patch-diff.githubusercontent.com/login?return_to=https%3A%2F%2Fgithub.com%2FDefenceDev%2FDigital-Forensics-Guide
GitHub CopilotWrite better code with AIhttps://github.com/features/copilot
GitHub SparkBuild and deploy intelligent appshttps://github.com/features/spark
GitHub ModelsManage and compare promptshttps://github.com/features/models
MCP RegistryNewIntegrate external toolshttps://github.com/mcp
ActionsAutomate any workflowhttps://github.com/features/actions
CodespacesInstant dev environmentshttps://github.com/features/codespaces
IssuesPlan and track workhttps://github.com/features/issues
Code ReviewManage code changeshttps://github.com/features/code-review
GitHub Advanced SecurityFind and fix vulnerabilitieshttps://github.com/security/advanced-security
Code securitySecure your code as you buildhttps://github.com/security/advanced-security/code-security
Secret protectionStop leaks before they starthttps://github.com/security/advanced-security/secret-protection
Why GitHubhttps://github.com/why-github
Documentationhttps://docs.github.com
Bloghttps://github.blog
Changeloghttps://github.blog/changelog
Marketplacehttps://github.com/marketplace
View all featureshttps://github.com/features
Enterpriseshttps://github.com/enterprise
Small and medium teamshttps://github.com/team
Startupshttps://github.com/enterprise/startups
Nonprofitshttps://github.com/solutions/industry/nonprofits
App Modernizationhttps://github.com/solutions/use-case/app-modernization
DevSecOpshttps://github.com/solutions/use-case/devsecops
DevOpshttps://github.com/solutions/use-case/devops
CI/CDhttps://github.com/solutions/use-case/ci-cd
View all use caseshttps://github.com/solutions/use-case
Healthcarehttps://github.com/solutions/industry/healthcare
Financial serviceshttps://github.com/solutions/industry/financial-services
Manufacturinghttps://github.com/solutions/industry/manufacturing
Governmenthttps://github.com/solutions/industry/government
View all industrieshttps://github.com/solutions/industry
View all solutionshttps://github.com/solutions
AIhttps://github.com/resources/articles?topic=ai
Software Developmenthttps://github.com/resources/articles?topic=software-development
DevOpshttps://github.com/resources/articles?topic=devops
Securityhttps://github.com/resources/articles?topic=security
View all topicshttps://github.com/resources/articles
Customer storieshttps://github.com/customer-stories
Events & webinarshttps://github.com/resources/events
Ebooks & reportshttps://github.com/resources/whitepapers
Business insightshttps://github.com/solutions/executive-insights
GitHub Skillshttps://skills.github.com
Documentationhttps://docs.github.com
Customer supporthttps://support.github.com
Community forumhttps://github.com/orgs/community/discussions
Trust centerhttps://github.com/trust-center
Partnershttps://github.com/partners
GitHub SponsorsFund open source developershttps://github.com/sponsors
Security Labhttps://securitylab.github.com
Maintainer Communityhttps://maintainers.github.com
Acceleratorhttps://github.com/accelerator
Archive Programhttps://archiveprogram.github.com
Topicshttps://github.com/topics
Trendinghttps://github.com/trending
Collectionshttps://github.com/collections
Enterprise platformAI-powered developer platformhttps://github.com/enterprise
GitHub Advanced SecurityEnterprise-grade security featureshttps://github.com/security/advanced-security
Copilot for BusinessEnterprise-grade AI featureshttps://github.com/features/copilot/copilot-business
Premium SupportEnterprise-grade 24/7 supporthttps://github.com/premium-support
Pricinghttps://github.com/pricing
Search syntax tipshttps://docs.github.com/search-github/github-code-search/understanding-github-code-search-syntax
documentationhttps://docs.github.com/search-github/github-code-search/understanding-github-code-search-syntax
Sign in https://patch-diff.githubusercontent.com/login?return_to=https%3A%2F%2Fgithub.com%2FDefenceDev%2FDigital-Forensics-Guide
Sign up https://patch-diff.githubusercontent.com/signup?ref_cta=Sign+up&ref_loc=header+logged+out&ref_page=%2F%3Cuser-name%3E%2F%3Crepo-name%3E&source=header-repo&source_repo=DefenceDev%2FDigital-Forensics-Guide
Reloadhttps://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide
Reloadhttps://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide
Reloadhttps://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide
DefenceDev https://patch-diff.githubusercontent.com/DefenceDev
Digital-Forensics-Guidehttps://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide
mikeroyal/Digital-Forensics-Guidehttps://patch-diff.githubusercontent.com/mikeroyal/Digital-Forensics-Guide
Notifications https://patch-diff.githubusercontent.com/login?return_to=%2FDefenceDev%2FDigital-Forensics-Guide
Fork 0 https://patch-diff.githubusercontent.com/login?return_to=%2FDefenceDev%2FDigital-Forensics-Guide
Star 0 https://patch-diff.githubusercontent.com/login?return_to=%2FDefenceDev%2FDigital-Forensics-Guide
0 stars https://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide/stargazers
267 forks https://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide/forks
Branches https://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide/branches
Tags https://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide/tags
Activity https://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide/activity
Star https://patch-diff.githubusercontent.com/login?return_to=%2FDefenceDev%2FDigital-Forensics-Guide
Notifications https://patch-diff.githubusercontent.com/login?return_to=%2FDefenceDev%2FDigital-Forensics-Guide
Code https://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide
Pull requests 0 https://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide/pulls
Actions https://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide/actions
Projects 0 https://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide/projects
Security 0 https://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide/security
Insights https://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide/pulse
Code https://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide
Pull requests https://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide/pulls
Actions https://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide/actions
Projects https://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide/projects
Security https://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide/security
Insights https://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide/pulse
Brancheshttps://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide/branches
Tagshttps://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide/tags
https://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide/branches
https://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide/tags
80 Commitshttps://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide/commits/main/
https://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide/commits/main/
CONTRIBUTING.mdhttps://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide/blob/main/CONTRIBUTING.md
CONTRIBUTING.mdhttps://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide/blob/main/CONTRIBUTING.md
Getting Started with Digital Forensics.pyhttps://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide/blob/main/Getting%20Started%20with%20Digital%20Forensics.py
Getting Started with Digital Forensics.pyhttps://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide/blob/main/Getting%20Started%20with%20Digital%20Forensics.py
README.mdhttps://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide/blob/main/README.md
README.mdhttps://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide/blob/main/README.md
Security Glossary.mdhttps://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide/blob/main/Security%20Glossary.md
Security Glossary.mdhttps://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide/blob/main/Security%20Glossary.md
READMEhttps://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide
Contributinghttps://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide
https://user-images.githubusercontent.com/45159366/128566063-b2661938-6f0b-4110-b52d-d6f6da04ee8e.png
https://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide#-----digital-forensics-guide
https://github.com/mikeroyal?tab=followers
https://camo.githubusercontent.com/7218f715542cdd6d5ec2902c690b9da38d5ca9ca8b45b2c990dbd8679d383eb1/68747470733a2f2f696d672e736869656c64732e696f2f6d61696e74656e616e63652f7965732f323032333f7374796c653d666f722d7468652d6261646765
https://camo.githubusercontent.com/392d638f14721935c22dfe3313df7c304f57ff34e2c94f89e4d2776e9910337d/68747470733a2f2f696d672e736869656c64732e696f2f6769746875622f6c6173742d636f6d6d69742f6d696b65726f79616c2f6469676974616c2d666f72656e736963732d67756964653f7374796c653d666f722d7468652d6261646765
https://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide#a-guide-covering-digital-forensics-the-applications-libraries-and-tools-that-will-make-you-a-better-and-more-efficient-with-digital-forensics-development
VSCodehttps://code.visualstudio.com/
Markdown PDFhttps://marketplace.visualstudio.com/items?itemName=yzane.markdown-pdf
https://user-images.githubusercontent.com/45159366/128566069-72aec035-4c2c-47cc-b3eb-6114d10689ec.png
https://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide#table-of-contents
Getting Started with Digital Forensics https://github.com/mikeroyal/Digital-Forensics-Guide#getting-started-with-digital-forensics
Books & Tutorialshttps://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide#Books--Tutorials
Digital Forensics Certifications & Courseshttps://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide#Digital-Forensics-Certifications--Courses
Playbookshttps://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide#playbooks
YouTube Tutorialshttps://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide#youtube-tutorials
Digital Forensics Tools, Libraries, and Frameworkshttps://github.com/mikeroyal/Digital-Forensics-Guide#digital-forensics-tools-libraries-and-frameworks
Virtualizationhttps://github.com/mikeroyal/Digital-Forensics-Guide#virtualization
File systemshttps://github.com/mikeroyal/Digital-Forensics-Guide#file-systems
Security Tools and Frameworkshttps://github.com/mikeroyal/Digital-Forensics-Guide#security-tools-and-frameworks
Networkinghttps://github.com/mikeroyal/Digital-Forensics-Guide#networking
https://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide#getting-started-with-digital-forensics
Back to the Tophttps://github.com/mikeroyal/Digital-Forensics-Guide#table-of-contents
Digital Forensicshttps://www.dhs.gov/publication/digital-forensics-tools
Computer Forensicshttps://en.wikipedia.org/wiki/Computer_forensics
Mobile device forensicshttps://resources.infosecinstitute.com/topic/mobile-forensics-process-steps-types/
Network forensicshttps://resources.infosecinstitute.com/topic/network-forensics-overview/
Database forensicshttps://resources.infosecinstitute.com/topic/computer-forensics-overview-types-database-forensics/
https://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide#books--tutorials
OSSTMM (Open Source Security Testing Methodology Manual) PDFhttps://github.com/mikeroyal/Open-Source-Security-Guide/files/8834704/osstmm.en.2.1.pdf
NIST Technical Guide to Information Security Testing and Assessment (PDF)https://github.com/mikeroyal/Open-Source-Security-Guide/files/8834705/nistspecialpublication800-115.pdf
Python Digital Forensics Cookbookhttps://github.com/PythonForensics/PythonForensicsCookbook
Applied Incident Responsehttps://www.amazon.com/Applied-Incident-Response-Steve-Anson/dp/1119560268/
Art of Memory Forensicshttps://www.amazon.com/Art-Memory-Forensics-Detecting-Malware/dp/1118825098/
Crafting the InfoSec Playbook: Security Monitoring and Incident Response Master Planhttps://www.amazon.com/Crafting-InfoSec-Playbook-Security-Monitoring/dp/1491949406
Digital Forensics and Incident Response: Incident response techniques and procedures to respond to modern cyber threatshttps://www.amazon.com/Digital-Forensics-Incident-Response-techniques/dp/183864900X
Introduction to DFIRhttps://medium.com/@sroberts/introduction-to-dfir-d35d5de4c180/
Incident Response & Computer Forensics, Third Editionhttps://www.amazon.com/Incident-Response-Computer-Forensics-Third/dp/0071798684/
Incident Response Techniques for Ransomware Attackshttps://www.amazon.com/Incident-Response-Techniques-Ransomware-Attacks/dp/180324044X
Incident Response with Threat Intelligencehttps://www.amazon.com/Incident-response-Threat-Intelligence-intelligence-based/dp/1801072957
Intelligence-Driven Incident Responsehttps://www.amazon.com/Intelligence-Driven-Incident-Response-Outwitting-Adversary-ebook-dp-B074ZRN5T7/dp/B074ZRN5T7
Operator Handbook: Red Team + OSINT + Blue Team Referencehttps://www.amazon.com/Operator-Handbook-Team-OSINT-Reference/dp/B085RR67H5/
Practical Memory Forensicshttps://www.amazon.com/Practical-Memory-Forensics-Jumpstart-effective/dp/1801070334
The Practice of Network Security Monitoring: Understanding Incident Detection and Responsehttp://www.amazon.com/gp/product/1593275099
GitGuardian API Security Best Practicehttps://github.com/GitGuardian/APISecurityBestPractices
Open Source Security Foundation (OpenSSF) npm Best Practices Guidehttps://github.com/ossf/package-manager-best-practices/blob/main/published/npm.md
Open Source Security Foundation (OpenSSF) Best Practices for Open Source Developershttps://github.com/ossf/wg-best-practices-os-developers
Open Source Security Foundation (OpenSSF) Identifying Security Threats in Open Source Projectshttps://github.com/ossf/wg-identifying-security-threats
OWASP Foundation Top 10https://owasp.org/www-project-top-ten/
Common Weakness Enumeration (CWE) Top 25https://cwe.mitre.org/top25/archive/2022/2022_cwe_top25.html
Securing The Software Supply Chain: Recommended Practices Guide for Developers | CISA, NSA, and ODNI (PDF)https://media.defense.gov/2022/Sep/01/2003068942/-1/-1/0/ESF_SECURING_THE_SOFTWARE_SUPPLY_CHAIN_DEVELOPERS.PDF
https://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide#digital-forensics-certifications--courses
Computer Forensics Training Courses | Udemyhttps://www.udemy.com/topic/computer-forensics/
Computer Forensics Courses | Courserahttps://www.coursera.org/specializations/computerforensics
Learn Computer Forensics with Online Courses and Lessons | edXhttps://www.edx.org/learn/computer-forensics
Computer Forensics Courese Learning Path - Infosec Institutehttps://www.infosecinstitute.com/skills/learning-paths/computer-forensics/
National Computer Forensics Institute(NCFI) Training Courseshttps://www.ncfi.usss.gov/ncfi/pages/courses.xhtml
Computer Forensics Training and Courses | X-Wayshttps://www.x-ways.net/training/index.html
Mile2's Certified Digital Forensics Examiner training coursehttps://niccs.cisa.gov/training/search/mile2/certified-digital-forensics-examiner-cdfe
Cyber Security Training, Certifications, Degrees and Resources | SANS Institutehttps://computer-forensics.sans.org
IACIS - BCFE: Basic Computer Forensic Examiner coursehttps://www.iacis.com/training/basic-computer-forensics-examiner/
SANS FOR518: Mac and iOS Forensic Analysis and Incident Response Coursehttps://www.sans.org/cyber-security-courses/mac-and-ios-forensic-analysis-and-incident-response/
SANS FOR500: Windows Forensic Analysis Coursehttps://www.sans.org/cyber-security-courses/windows-forensic-analysis/
https://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide#playbooks
Back to the Tophttps://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide#table-of-contents
Automate threat response with playbooks in Microsoft Azure with Sentinelhttps://github.com/MicrosoftDocs/azure-docs/blob/main/articles/sentinel/tutorial-respond-threats-playbook.md
AWS Incident Response Runbook Sampleshttps://github.com/aws-samples/aws-incident-response-runbooks/tree/0d9a1c0f7ad68fb2c1b2d86be8914f2069492e21
Counteractive Playbookshttps://github.com/counteractive/incident-response-plan-template/tree/master/playbooks
GuardSIght Playbook Battle Cardshttps://github.com/guardsight/gsvsoc_cirt-playbook-battle-cards
IRMhttps://github.com/certsocietegenerale/IRM
IR Workflow Galleryhttps://www.incidentresponse.org/playbooks/
PagerDuty Incident Response Documentationhttps://response.pagerduty.com/
GitHubhttps://github.com/PagerDuty/incident-response-docs
Phantom Community Playbookshttps://github.com/phantomcyber/playbooks
ThreatHunter-Playbookhttps://github.com/OTRF/ThreatHunter-Playbook
https://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide#youtube-tutorials
Back to the Tophttps://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide#table-of-contents
https://www.youtube.com/watch?v=giv0DQDSsjQ&list=PLJu2iQtpGvv-2LtysuTTka7dHt9GKUbxD
https://www.youtube.com/watch?v=eftOgRsHK4A
https://www.youtube.com/watch?v=STTlaGBJ9Y4
https://www.youtube.com/watch?v=oMAvSpq9fYY
https://www.youtube.com/watch?v=fhBQ3IZnW-Q
https://www.youtube.com/watch?v=SUOQdR3BBtE
https://www.youtube.com/watch?v=j3lgxdylktM
https://www.youtube.com/watch?v=dDhZLPntJd8
https://www.youtube.com/watch?v=LJKzcUtR2qQ
https://www.youtube.com/watch?v=DShqfSOhgyw
https://www.youtube.com/watch?v=f452CYRijFo
https://www.youtube.com/watch?v=Urluwrkhnik
https://www.youtube.com/watch?v=-Oe0si3XESY
https://www.youtube.com/watch?v=wtF7O89RTTU
https://www.youtube.com/watch?v=NU9LNS3-rmo
https://www.youtube.com/watch?v=xOFxWE-IB3M
https://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide#digital-forensics-tools-libraries-and-frameworks
Back to the Tophttps://github.com/mikeroyal/Digital-Forensics-Guide#table-of-contents
Autopsy®https://sleuthkit.org/autopsy/
The Sleuth Kit® (TSK)https://sleuthkit.org/sleuthkit/
PTK Forensicshttps://wiki.sleuthkit.org/index.php?title=PTK
DFF (Digital Forensics Framework)https://tools.kali.org/forensics/dff
Mobile Device Investigator®https://www.adfsolutions.com/mobile-device-investigator
Digital Evidence Investigator®https://www.adfsolutions.com/dei
Digital Evidence Investigator® PROhttps://www.adfsolutions.com/dei-pro
Digital Evidence Investigator®https://www.adfsolutions.com/dei
Mobile Device Investigator®https://www.adfsolutions.com/mobile-device-investigator
Guymagerhttps://tools.kali.org/forensics/guymager
X-Ways Forensicshttps://x-ways.net/forensics/
X-Ways Investigatorhttps://www.x-ways.net/investigator/index-m.html
WinHexhttps://www.x-ways.net/winhex/index-m.html
F-Responsehttps://www.x-ways.net/f-response.html
AccessData Forensics Toolkit (FTK®)https://accessdata.com/product-download
OpenText™ EnCase™https://security.opentext.com/encase-forensic
Redline®https://www.fireeye.com/services/freeware/redline.html
Paraben's Electronic Evidence Examiner—E3https://paraben.com/
Bulk Extractorhttps://tools.kali.org/forensics/bulk-extractor
Registry Reconhttps://arsenalrecon.com/
Volatilityhttps://www.volatilityfoundation.org/
WindowsSCOPEhttps://www.bluerisc.com/windowsscope/
Wiresharkhttps://www.wireshark.org/
Network Minerhttps://www.netresec.com/?page=NetworkMiner
Xplicohttps://www.xplico.org/
Oxygen Forensic Detectivehttps://www.oxygen-forensic.com/en/products/oxygen-forensic-detective-enterprise
XRYhttps://www.msab.com/products/xry/
SIFT Workstationhttps://www.sans.org/tools/sift-workstation/
HashKeeperhttps://www.nist.gov/itl/ssd/software-quality-group/national-software-reference-library-nsrl/about-nsrl/nsrl-frequently
Forensic Explorer Command Line (FEX CLI)https://getdataforensics.com/product/fex-cli/
FEX Memory Imager (FEX Memory)https://getdataforensics.com/product/fex-memory-imager/
FEX Imager™https://getdataforensics.com/product/fex-imager/
Forensic Explorer™https://getdataforensics.com/product/forensic-explorer-fex/
Rehexhttps://github.com/solemnwarning/rehex
DIRTYhttps://github.com/CMUSTRUDEL/DIRTY
Dissecthttps://github.com/fox-it/dissect
Acquirehttps://github.com/fox-it/acquire
Artifactcollectorhttps://github.com/forensicanalysis/artifactcollector
Cold Disk Quick Responsehttps://github.com/rough007/CDQR
CyLRhttps://github.com/orlikoski/CyLR
Forensic Artifactshttps://github.com/ForensicArtifacts/artifacts
UAC (Unix-like Artifacts Collector)https://github.com/tclahr/uac
Magnet ACQUIREhttps://www.magnetforensics.com/magnet-acquire/
https://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide#virtualization
Back to the Tophttps://github.com/mikeroyal/Digital-Forensics-Guide#table-of-contents
HVM (Hardware Virtual Machine)https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/virtualization_types.html
PV(ParaVirtualization)https://wiki.xenproject.org/wiki/Paravirtualization_(PV)
Virtualization-based Security (VBS)https://docs.microsoft.com/en-us/windows-hardware/design/device-experiences/oem-vbs
Hypervisor-Enforced Code Integrity (HVCI)https://docs.microsoft.com/en-us/windows-hardware/drivers/bringup/device-guard-and-credential-guard
KVM (for Kernel-based Virtual Machine)https://www.linux-kvm.org/page/Main_Page
QEMUhttps://www.qemu.org
Hyper-Vhttps://docs.microsoft.com/en-us/virtualization/hyper-v-on-windows/
VirtManagerhttps://github.com/virt-manager/virt-manager
oVirthttps://www.ovirt.org
HyperKithttps://github.com/moby/hyperkit
xhyvehttps://github.com/mist64/xhyve
bhyvehttps://bhyve.org/
VPNKithttps://github.com/moby/vpnkit
DataKithttps://github.com/moby/datakit
Hypervisor.frameworkhttps://developer.apple.com/library/mac/documentation/DriversKernelHardware/Reference/Hypervisor/index.html
Intel® Graphics Virtualization Technology (Intel® GVT)https://github.com/intel/gvt-linux
Apple Hypervisorhttps://developer.apple.com/documentation/hypervisor
Mac App Storehttps://www.appstore.com/
Apple Virtualization Frameworkhttps://developer.apple.com/documentation/virtualization
Virtio specificationhttps://www.redhat.com/en/virtio-networking-series
Apple Paravirtualized Graphics Frameworkhttps://developer.apple.com/documentation/paravirtualizedgraphics
Cloud Hypervisorhttps://github.com/cloud-hypervisor/cloud-hypervisor
KVMhttps://www.kernel.org/doc/Documentation/virtual/kvm/api.txt
Rusthttps://www.rust-lang.org/
rust-vmmhttps://github.com/rust-vmm
VMware vSphere Hypervisorhttps://www.vmware.com/products/vsphere-hypervisor.html
Xenhttps://github.com/xen-project/xen
Ganetihttps://github.com/ganeti/ganeti
Packerhttps://www.packer.io/
Vagranthttps://www.vagrantup.com/
Parallels Desktophttps://www.parallels.com
Apple M1 chiphttps://www.apple.com/newsroom/2020/11/apple-unleashes-m1/
VMware Fusionhttps://www.vmware.com/products/fusion.html
Kubernetes clustershttps://www.vmware.com/topics/glossary/content/kubernetes-cluster
VMware Workstationhttps://www.vmware.com/products/workstation-pro.html
https://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide#file-systems
Back to the Tophttps://github.com/mikeroyal/Digital-Forensics-Guide#table-of-contents
GlusterFShttps://www.gluster.org/
Cephhttps://ceph.io/
CAPEXhttps://corporatefinanceinstitute.com/resources/knowledge/modeling/how-to-calculate-capex-formula/
OPEXhttps://www.investopedia.com/terms/o/operating_expense.asp
Hadoop Distributed File System (HDFS)https://www.ibm.com/analytics/hadoop/hdfs
MapReducehttps://www.ibm.com/analytics/hadoop/mapreduce
YARNhttps://hadoop.apache.org/docs/current/hadoop-yarn/hadoop-yarn-site/YARN.html
ZFShttps://docs.oracle.com/cd/E19253-01/819-5461/zfsover-2/
OpenZFShttps://openzfs.org/wiki/Main_Page
Btrfshttps://btrfs.wiki.kernel.org/index.php/Main_Page
Squashfshttps://www.kernel.org/doc/html/latest/filesystems/squashfs.html
Apple File System (APFS)https://support.apple.com/guide/disk-utility/file-system-formats-available-in-disk-utility-dsku19ed921c/mac
NTFS(New Technology File System)https://docs.microsoft.com/en-us/windows-server/storage/file-server/ntfs-overview
exFAT(Extended File Allocation Table )https://docs.microsoft.com/en-us/windows/win32/fileio/exfat-specification
https://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide#security-tools-and-frameworks
Back to the Tophttps://github.com/mikeroyal/Digital-Forensics-Guide#table-of-contents
https://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide#security-benchmarks
Back to the Tophttps://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide#table-of-contents
STIGs Benchmarks - Security Technical Implementation Guideshttps://public.cyber.mil/stigs/
CIS Benchmarks - CIS Center for Internet Securityhttps://www.cisecurity.org/cis-benchmarks/
CIS Top 18 Critical Security Controlshttps://www.cisecurity.org/controls/cis-controls-list
OSSTMM (Open Source Security Testing Methodology Manual) PDFhttps://github.com/mikeroyal/Open-Source-Security-Guide/files/8834704/osstmm.en.2.1.pdf
NIST Technical Guide to Information Security Testing and Assessment (PDF)https://github.com/mikeroyal/Open-Source-Security-Guide/files/8834705/nistspecialpublication800-115.pdf
NIST - Current FIPShttps://www.nist.gov/itl/current-fips
https://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide#security-standards--frameworks
Back to the Tophttps://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide#table-of-contents
ISO Standards Cataloguehttps://www.iso.org/standards.html
Federal Risk and Authorization Management Program (FedRAMP)https://www.gsa.gov/technology/government-it-initiatives/fedramp
Federal Information Security Management Act (FISMA)https://csrc.nist.gov/topics/laws-and-regulations/laws/fisma
Common Criteria for Information Technology Security Evaluation (CC)https://www.commoncriteriaportal.org/cc/
ISO 22301https://www.iso.org/en/contents/data/standard/07/51/75106.html
ISO27001https://www.iso.org/isoiec-27001-information-security.html
ISO 27701https://www.iso.org/en/contents/data/standard/07/16/71670.html
SOC 2https://www.aicpa.org/interestareas/frc/assuranceadvisoryservices/aicpasoc2report.html
NIST CSFhttps://www.nist.gov/national-security-standards
EU GDPR (General Data Protection Regulation)https://gdpr.eu/
CCPA (California Consumer Privacy Act)https://www.oag.ca.gov/privacy/ccpa
Payment Card Industry (PCI) Data Security Standards (DSS)https://docs.microsoft.com/en-us/microsoft-365/compliance/offering-pci-dss
Landlock LSM(Linux Security Module)https://www.kernel.org/doc/html/latest/security/landlock.html
Secure boothttps://docs.microsoft.com/en-us/windows-hardware/design/device-experiences/oem-secure-boot
https://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide#security-encryption
Back to the Tophttps://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide#table-of-contents
https://user-images.githubusercontent.com/45159366/196625534-1cebcd35-7654-41cc-bbb2-33913a391a53.png
MD5 (Message Digest 5)https://en.wikipedia.org/wiki/MD5
SHA (Secure Hash Algorithm)https://en.wikipedia.org/wiki/Secure_hash_algorithms
https://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide#security-tools
Netdatahttps://github.com/netdata/netdata
Acrahttps://cossacklabs.com/acra
OWASP Nettackerhttps://github.com/OWASP/Nettacker
OpenSCAPhttps://www.open-scap.org/
National Institute of Standards and Technology (NIST)https://www.nist.gov/
OWASPhttps://www.owasp.org/index.php/Main_Page
Open Vulnerability and Assessment Languagehttps://oval.mitre.org/
Terrascanhttps://runterrascan.io/
Sliverhttps://github.com/BishopFox/sliver
Payloads All The Thingshttps://github.com/swisskyrepo/PayloadsAllTheThings
Flipper Zerohttps://flipperzero.one/
TheHivehttps://thehive-project.org/
MISPhttp://www.misp-project.org/
Cortexhttps://thehive-project.org/
MITRE ATT&CK®https://attack.mitre.org/
CALDERA™https://caldera.mitre.org/
Atomic Red Team™https://github.com/redcanaryco/atomic-red-team
MITRE ATT&CK®https://attack.mitre.org/
OpenCTIhttps://www.opencti.io/
OWASP Amasshttps://owasp.org/www-project-amass/
LGTMhttps://github.com/marketplace/lgtm
Semgrephttps://github.com/marketplace/semgrep-dev
Socket Securityhttps://github.com/marketplace/socket-security
Snykhttps://github.com/marketplace/snyk
GitProtect.iohttps://github.com/marketplace/gitprotect-io
Mend Bolthttps://github.com/marketplace/whitesource-bolt
Rewind Backups for GitHub (Formerly BackHub)https://github.com/marketplace/backhub
Renovatehttps://github.com/marketplace/renovate
GuardRailshttps://github.com/marketplace/guardrails
ORY Oathkeeperhttps://github.com/ory/oathkeeper
Ory Kratoshttps://github.com/ory/kratos
Ory Hydrahttps://github.com/ory/hydra
login and consent apphttps://www.ory.sh/docs/hydra/oauth2#authenticating-users-and-requesting-consent
Ory Ketohttps://github.com/ory/keto
Zanzibar: Google's Consistent, Global Authorization Systemhttps://research.google/pubs/pub48190/
Dnsmasqhttps://dnsmasq.org/
Dissecthttps://github.com/fox-it/dissect
Acquirehttps://github.com/fox-it/acquire
Faradayhttps://www.faradaysec.com/
Security Onionhttps://github.com/Security-Onion-Solutions/securityonion
nDPI®http://www.ntop.org/
Azure Sentinelhttps://github.com/Azure/Azure-Sentinel
NETworkManagerhttps://github.com/BornToBeRoot/NETworkManager
Tailnethttps://tailscale.com/kb/1136/tailnet/
CGNAThttps://tailscale.com/kb/1015/100.x-addresses/
Tailscale SSHhttps://tailscale.com/kb/1193/tailscale-ssh/
Tailscale Funnelhttps://tailscale.com/kb/1223/tailscale-funnel/
Smaphttps://github.com/s0md3v/Smap
IVREhttps://ivre.rocks/
MISPhttps://www.misp-project.org/
Rapid7 Nexposehttps://www.rapid7.com/products/nexpose/
Niktohttps://github.com/sullo/nikto
Scapyhttps://scapy.net/
OSSEC HIDS(Host Intrusion Detection System)https://www.ossec.net/
OpenMPTCProuterhttps://www.openmptcprouter.com/
MultiPath TCP (MPTCP)https://www.multipath-tcp.org/
OpenWrthttps://openwrt.org/
Scrummagehttps://github.com/matamorphosis/Scrummage
OSINThttps://osintframework.com/
Sandstormhttps://sandstorm.io/
mkcerthttps://mkcert.dev/
ir-rescuehttps://github.com/diogo-fernan/ir-rescue
Live Response Collectionhttps://www.brimorlabs.com/tools/
Margarita Shotgunhttps://github.com/ThreatResponse/margaritashotgun
Catalysthttps://github.com/SecurityBrewery/catalyst
CyberCPRhttps://www.cybercpr.com
Agehttps://age-encryption.org/
SOPShttps://github.com/mozilla/sops
Universal Radio Hacker (URH)https://github.com/jopohl/urh
Cloudflare Tunnel clienthttps://developers.cloudflare.com/cloudflare-one/connections/connect-apps/install-and-setup/tunnel-guide
Cloudflare WARP clienthttps://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/
Bettercaphttps://www.bettercap.org/
WiFihttps://www.bettercap.org/modules/wifi/
Bluetooth Low Energyhttps://www.bettercap.org/modules/ble/
HIDhttps://www.bettercap.org/modules/hid/
Ethernethttps://www.bettercap.org/modules/ethernet
Wifiphisherhttps://wifiphisher.org/
Fast Incident Response (FIR)https://github.com/certsocietegenerale/FIR/
Request Tracker for Incident Response (RTIR)https://www.bestpractical.com/rtir/
Sandia Cyber Omni Tracker (SCOT)https://github.com/sandialabs/scot
Shufflehttps://github.com/frikky/Shuffle
threat_notehttps://github.com/defpoint/threat_note
Zendutyhttps://www.zenduty.com
Attack Surface Analyzerhttps://github.com/microsoft/AttackSurfaceAnalyzer
Microsofthttps://github.com/microsoft/
CrowdSechttps://www.crowdsec.net/
Crowdsec Firewall Bouncerhttps://github.com/crowdsecurity/cs-firewall-bouncer
Pulsehttps://kean.blog/pulse/home
Pulse Prohttps://kean.blog/pulse/pro
tshark.devhttps://tshark.dev/
Nebulahttps://github.com/slackhq/nebula
Parcahttps://parca.dev/
DeepFlowhttps://github.com/deepflowys/deepflow
Hettyhttps://github.com/dstotijn/hetty
LGTMhttps://github.com/marketplace/lgtm
Intel Owlhttps://intelowl.readthedocs.io/
Deepfence ThreatMapperhttps://deepfence.io/
Docklehttps://containers.goodwith.tech/
SpiceDBhttps://docs.authzed.com/
Zanzibarhttps://authzed.com/blog/what-is-zanzibar/
Trivyhttps://aquasecurity.github.io/trivy/
Lynishttps://cisofy.com/lynis/
RustScanhttps://github.com/RustScan/RustScan
gosechttps://github.com/securego/gosec
Prowlerhttps://github.com/prowler-cloud/prowler
eNginehttps://github.com/yogeshojha/rengine
Osmedeushttps://github.com/j3ssie/osmedeus
IDA Pro(Interactive DisAssembler Professional)https://hex-rays.com/IDA-pro/
Ghidrahttps://github.com/NationalSecurityAgency/ghidra
DataWavehttps://github.com/NationalSecurityAgency/datawave
Apache Accumulohttps://accumulo.apache.org/
Emissaryhttps://github.com/NationalSecurityAgency/emissary
MADCerthttps://github.com/NationalSecurityAgency/MADCert
BLESS(Bastion's Lambda Ephemeral SSH Service)https://github.com/Netflix/bless
Zuulhttps://github.com/Netflix/zuul
L7 application gatewayhttps://www.f5.com/services/resources/glossary/application-layer-gateway
Chaos Monkeyhttps://github.com/Netflix/chaosmonkey
Spinnakerhttps://www.spinnaker.io/
Priamhttps://github.com/Netflix/Priam
Vectorhttps://github.com/Netflix/vector
Control Groups(Cgroups)https://www.redhat.com/sysadmin/cgroups-part-one
Libgcrypthttps://www.gnupg.org/related_software/libgcrypt/
Aircrack-nghttps://www.aircrack-ng.org/
Burp Suitehttps://portswigger.net/burp
Ciliumhttps://cilium.io/
Hubblehttps://github.com/cilium/hubble
Istiohttps://istio.io/
Certgenhttps://github.com/cilium/certgen
syzkallerhttps://github.com/google/syzkaller
SchedVizhttps://github.com/google/schedviz
oss-fuzzhttps://google.github.io/oss-fuzz/
OSSEChttps://www.ossec.net/
Metasploit Projecthttps://www.metasploit.com/
Wfuzzhttps://github.com/xmendez/wfuzz
Nmaphttps://nmap.org/
Patchworkhttps://github.com/getpatchwork/patchwork
pfSensehttps://www.pfsense.org/
Snorthttps://www.snort.org/
Wiresharkhttps://www.wireshark.org/
Tinkhttps://github.com/google/tink
https://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide#security-threat-models
Back to the Tophttps://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide#table-of-contents
Diamond Model of Intrusion Analysishttps://apps.dtic.mil/sti/citations/ADA586960
https://user-images.githubusercontent.com/45159366/196002361-122704b9-250c-48cb-a1fc-b3b97fcb6447.png
Cyber Kill Chain frameworkhttps://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html
https://user-images.githubusercontent.com/45159366/196002362-5233433c-24ea-44c5-9218-d883995f3cc0.png
MITRE ATT&CKhttps://attack.mitre.org/
https://user-images.githubusercontent.com/45159366/196002365-0311fd8d-d3d0-4b87-adb1-b36168101da4.png
ISO/IEC 27005 InfoSec Risk Managementhttps://www.iso.org/standard/75281.html
https://user-images.githubusercontent.com/45159366/196002367-6198a209-4495-44d6-a098-24d9198bb769.png
https://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide#threat-intelligence-platform
Back to the Tophttps://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide#table-of-contents
https://user-images.githubusercontent.com/45159366/226541101-d5764c14-d4fd-4730-8662-bd731b9826c1.png
https://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide#threat-intelligence-tools
Anomali ThreatStreamhttps://www.anomali.com/products/threatstream
IBM X-Force Exchangehttps://www.ibm.com/products/xforce-exchange
LookingGlass scoutTHREAThttps://lookingglasscyber.com/solutions/scoutthreat/
Recorded Future Intelligence Cloudhttps://www.recordedfuture.com/platform
ThreatConnecthttps://threatconnect.com/
https://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide#security-orchestration-automation-and-response-soar
Back to the Tophttps://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide#table-of-contents
https://user-images.githubusercontent.com/45159366/220051296-eab86ab1-18d2-4908-aee9-8c95c1802d11.png
Splunk Phantomhttps://www.splunk.com/en_us/software/splunk-security-orchestration-and-automation.html
IBM IBM Security QRadar SOARhttps://www.ibm.com/products/soar-platform
Sumo Logic Cloud SOARhttps://www.sumologic.com/solutions/cloud-soar/
Rapid7 Insightconnecthttps://www.rapid7.com/products/insightconnect/
LogRhythm RespondXhttps://logrhythm.com/products/logrhythm-respondx/
Exabeam incident responderhttps://www.exabeam.com/product/exabeam-incident-responder/#close
ServiceNow Security Operationshttps://www.servicenow.com/products/security-operations.html
SIRPhttps://www.sirp.io/
Chronicle SOARhttps://cloud.google.com/chronicle/docs/soar/soar
Palo Alto Networks Cortex XSOARhttps://www.paloaltonetworks.com/cortex/cortex-xsoar/
Fortinet FortiSOARhttps://www.fortinet.com/products/fortisoar
Swimlane SOARhttps://swimlane.com/platform/
https://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide#security-information-and-event-management-siem
Back to the Tophttps://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide#table-of-contents
https://user-images.githubusercontent.com/45159366/223664751-bb85c477-6447-4c55-bf73-f4dbd8aeffaf.png
https://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide#siem-tools
Datadog Security Monitoringhttps://www.datadoghq.com/security-monitoring-tools/
Logpointhttps://www.logpoint.com/
Grayloghttps://www.graylog.org/
Exabeam Fusionhttps://www.exabeam.com/product/
Elastic Securityhttps://www.elastic.co/security
Fortinet FortiSIEMhttps://www.fortinet.com/products/siem/fortisiem
Splunk Enterprise Securityhttps://www.fortinet.com/products/siem/fortisiem
OSSEC The Open-source HIDS Securityhttps://www.ossec.net/
LogRhythm NextGen SIEM Platformhttps://logrhythm.com/solutions/security/siem/
https://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide#user-and-entity-behavior-analytics-ueba
Back to the Tophttps://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide#table-of-contents
https://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide#three-pillars-of-ueba
https://user-images.githubusercontent.com/45159366/224644382-c74808d7-458d-4bbb-9238-8cde8bf276e4.png
Active Directoryhttps://learn.microsoft.com/en-us/windows-server/identity/ad-ds/get-started/virtual-dc/active-directory-domain-services-overview
https://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide#detection--response-types
Back to the Tophttps://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide#table-of-contents
Endpoint Detection and Response (EDR)https://www.crowdstrike.com/cybersecurity-101/endpoint-security/endpoint-detection-and-response-edr/
Extended detection and response (XDR)https://www.crowdstrike.com/cybersecurity-101/what-is-xdr/
Managed detection and response (MDR)https://www.crowdstrike.com/cybersecurity-101/managed-detection-and-response-mdr/
Network Detection and Response (NDR)https://www.ibm.com/topics/ndr
https://user-images.githubusercontent.com/45159366/226541125-f6b079d5-022d-413e-ad35-bb2b80e24428.png
https://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide#networking
Back to the Tophttps://github.com/mikeroyal/Digital-Forensics-Guide#table-of-contents
https://user-images.githubusercontent.com/45159366/82833053-d1687b80-9e71-11ea-8c6d-074100f2f54b.png
https://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide#network-learning-resources
AWS Certified Security - Specialty Certificationhttps://aws.amazon.com/certification/certified-security-specialty/
Microsoft Certified: Azure Security Engineer Associatehttps://docs.microsoft.com/en-us/learn/certifications/azure-security-engineer
Google Cloud Certified Professional Cloud Security Engineerhttps://cloud.google.com/certification/cloud-security-engineer
Cisco Security Certificationshttps://www.cisco.com/c/en/us/training-events/training-certifications/certifications/security.html
The Red Hat Certified Specialist in Security: Linuxhttps://www.redhat.com/en/services/training/ex415-red-hat-certified-specialist-security-linux-exam
Linux Professional Institute LPIC-3 Enterprise Security Certificationhttps://www.lpi.org/our-certifications/lpic-3-303-overview
Cybersecurity Training and Courses from IBM Skillshttps://www.ibm.com/skills/topics/cybersecurity/
Cybersecurity Courses and Certifications by Offensive Securityhttps://www.offensive-security.com/courses-and-certifications/
Citrix Certified Associate – Networking(CCA-N)http://training.citrix.com/cms/index.php/certification/networking/
Citrix Certified Professional – Virtualization(CCP-V)https://www.globalknowledge.com/us-en/training/certification-prep/brands/citrix/section/virtualization/citrix-certified-professional-virtualization-ccp-v/
CCNP Routing and Switchinghttps://learningnetwork.cisco.com/s/ccnp-enterprise
Certified Information Security Manager(CISM)https://www.isaca.org/credentialing/cism
Wireshark Certified Network Analyst (WCNA)https://www.wiresharktraining.com/certification.html
Juniper Networks Certification Program Enterprise (JNCP)https://www.juniper.net/us/en/training/certification/
Networking courses and specializations from Courserahttps://www.coursera.org/browse/information-technology/networking
Network & Security Courses from Udemyhttps://www.udemy.com/courses/it-and-software/network-and-security/
Network & Security Courses from edXhttps://www.edx.org/learn/cybersecurity
https://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide#networking-tools--concepts
Qt Network Authorizationhttps://doc.qt.io/qt-6/qtnetworkauth-index.html
cURLhttps://curl.se/
cURL Fuzzerhttps://github.com/curl/curl-fuzzer
DoHhttps://github.com/curl/doh
Autheliahttps://www.authelia.com/
NGINXhttps://nginx.org/en/
nginx(engine x)https://nginx.org/en/
Proxmox Virtual Environment(VE)https://www.proxmox.com/en/
Wiresharkhttps://www.wireshark.org/
Wireshark Toolshttps://wiki.wireshark.org/Tools
HTTPiehttps://github.com/httpie/httpie
HTTPStathttps://github.com/reorx/httpstat
Wuzzhttps://github.com/asciimoo/wuzz
Websocathttps://github.com/vi/websocat
https://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide#network-layers
Open Systems Interconnecthttps://en.wikipedia.org/wiki/OSI_model
https://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide#interfaces
https://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide#network-protocols
JSON Web Token (JWT)https://jwt.io
OAuth 2.0https://oauth.net/2/
https://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide#contribute
Pull Requesthttps://github.com/mikeroyal/Digital-Forensics-Guide/pulls
https://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide#license
Back to the Tophttps://github.com/mikeroyal/Digital-Forensics-Guide#table-of-contents
Creative Commons Attribution 4.0 International (CC BY 4.0) Public Licensehttps://creativecommons.org/licenses/by/4.0/
Readme https://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide#readme-ov-file
Please reload this pagehttps://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide
Activityhttps://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide/activity
0 starshttps://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide/stargazers
0 watchinghttps://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide/watchers
0 forkshttps://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide/forks
Report repository https://patch-diff.githubusercontent.com/contact/report-content?content_url=https%3A%2F%2Fgithub.com%2FDefenceDev%2FDigital-Forensics-Guide&report=DefenceDev+%28user%29
Releaseshttps://patch-diff.githubusercontent.com/DefenceDev/Digital-Forensics-Guide/releases
Packages 0https://patch-diff.githubusercontent.com/users/DefenceDev/packages?repo_name=Digital-Forensics-Guide
https://github.com
Termshttps://docs.github.com/site-policy/github-terms/github-terms-of-service
Privacyhttps://docs.github.com/site-policy/privacy-policies/github-privacy-statement
Securityhttps://github.com/security
Statushttps://www.githubstatus.com/
Communityhttps://github.community/
Docshttps://docs.github.com/
Contacthttps://support.github.com?tags=dotcom-footer

Viewport: width=device-width


URLs of crawlers that visited me.