Sorry, the page you were looking for in this blog does not exist.
Sorry, the page you were looking for in this blog does not exist.
Subscribe to:
Posts (Atom)
jIIr Tools Download Locations
Most Read jIIr Posts
- Revealing Program Compatibility Assistant HKCU AppCompatFlags Registry Keys
- Re-Introducing $UsnJrnl
- Revealing the RecentFileCache.bcf File
- Finding An Infection Vector After IT Cleaned the System
- SIEM Use Case Implementation Mind Map
- Introducing the Digital Forensics Search
- Improving Your Malware Forensics Skills
- Triaging a System Infected with Poweliks
Search jIIr
jIIr's Labels
malware
exploits
timeline
attack vectors
malware analysis
script
tools
triage
links
advice
regripper
volume shadow copies
IR
examination steps
java
program execution
drive-by
prefetch
book review
registry
delivery artifacts
detection
tr3secure
NTFS
adobe
fraud
memory analysis
IDS
Practical
SIEM
digital forensics search
hcp
investigation process
malvertizing
metadata
shortcut files
timestomping
EEDI
Google
autorun
education
jumplists
perl
process hollowing
readiness
antiforensics
antivirus
scams
sharing
training
uac
Cuckoo
OSINT
autoplay
categories
chain of evidence
conferences
email
encase
feedreader
kinect
microsoft office
pfic
random
request-tracker
search poisoning
spam
testing
threat intelligence
web
xbox