-
awesome-anti-forensic
Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attributes. This all includes tools to work with anything in general that makes changes to a system for the purposes of hiding information.
-
InfluxDB
Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
Some dumps from my bookmark grave; keep an eye on the reference section of the research papers: - https://www.researchgate.net/profile/Robert-Luh-2/publication/319868952_The_Evolution_of_Process_Hiding_Techniques_in_Malware_-_Current_Threats_and_Possible_Countermeasures/links/59e896faaca272bc4240a539/The-Evolution-of-Process-Hiding-Techniques-in-Malware-Current-Threats-and-Possible-Countermeasures.pdf - https://i.blackhat.com/USA-20/Wednesday/us-20-Block-Hiding-Process-Memory-Via-Anti-Forensic-Techniques.pdf - https://www.elastic.co/blog/ten-process-injection-techniques-technical-survey-common-and-trending-process - https://github.com/shadawck/awesome-anti-forensic - https://www.sciencedirect.com/science/article/abs/pii/S1361372320300300 - https://archive.org/details/youtube-_fZfDGWpP4U - https://github.com/VanirLab/weever - https://github.com/dasec/fishy
Some dumps from my bookmark grave; keep an eye on the reference section of the research papers: - https://www.researchgate.net/profile/Robert-Luh-2/publication/319868952_The_Evolution_of_Process_Hiding_Techniques_in_Malware_-_Current_Threats_and_Possible_Countermeasures/links/59e896faaca272bc4240a539/The-Evolution-of-Process-Hiding-Techniques-in-Malware-Current-Threats-and-Possible-Countermeasures.pdf - https://i.blackhat.com/USA-20/Wednesday/us-20-Block-Hiding-Process-Memory-Via-Anti-Forensic-Techniques.pdf - https://www.elastic.co/blog/ten-process-injection-techniques-technical-survey-common-and-trending-process - https://github.com/shadawck/awesome-anti-forensic - https://www.sciencedirect.com/science/article/abs/pii/S1361372320300300 - https://archive.org/details/youtube-_fZfDGWpP4U - https://github.com/VanirLab/weever - https://github.com/dasec/fishy
Some dumps from my bookmark grave; keep an eye on the reference section of the research papers: - https://www.researchgate.net/profile/Robert-Luh-2/publication/319868952_The_Evolution_of_Process_Hiding_Techniques_in_Malware_-_Current_Threats_and_Possible_Countermeasures/links/59e896faaca272bc4240a539/The-Evolution-of-Process-Hiding-Techniques-in-Malware-Current-Threats-and-Possible-Countermeasures.pdf - https://i.blackhat.com/USA-20/Wednesday/us-20-Block-Hiding-Process-Memory-Via-Anti-Forensic-Techniques.pdf - https://www.elastic.co/blog/ten-process-injection-techniques-technical-survey-common-and-trending-process - https://github.com/shadawck/awesome-anti-forensic - https://www.sciencedirect.com/science/article/abs/pii/S1361372320300300 - https://archive.org/details/youtube-_fZfDGWpP4U - https://github.com/VanirLab/weever - https://github.com/dasec/fishy