2025’s Top OSINT Tools: A Fresh Take on Open-Source Intel
Check out the top OSINT tools of 2025, an updated list featuring the best free and paid open-source… Continue reading 2025’s Top OSINT Tools: A Fresh Take on Open-Source Intel
Collaborate Disseminate
Check out the top OSINT tools of 2025, an updated list featuring the best free and paid open-source… Continue reading 2025’s Top OSINT Tools: A Fresh Take on Open-Source Intel
I’m currently tasked with investigating and analyzing a domain name for potential issues. My goal is to identify any risks associated with this domain, such as security vulnerabilities, DNS issues, reputation concerns, or any other technic… Continue reading How to investigate and analyse a domain name for Potential Issues? [closed]
I have been reading about the chain of custody in cybersecurity-related forensics and I wonder how you can be so sure the forensic scientist made their job right and they are not a malicious actor.
I have a specific scenario in mind, let’s… Continue reading How can you trust a forensic scientist to have maintained the chain of custody?
Time is almost up for magnetic storage from the 80s and 90s. Various physical limitations in storage methods from this era are conspiring to slowly degrade the data stored on …read more Continue reading Preserving Floppy Disks
The Queensland police department said that the DNA sample from the case generated a genealogy tree of “15,000 ‘linked’ individuals” and they have not been able to find a close match yet. Continue reading Police Use DNA Phenotyping to Limit Pool of Suspects to 15,000
When Gabby Petito went missing on a cross-country road trip with her fiancé, the internet banded together to help find her. Right now, it’s unclear if they actually helped. Continue reading Inside TikTok’s Amateur Investigation Into Gabby Petito’s Disappearance
I’m a minor and I started chatting online with other minors sexually (mostly older than myself) on an “anonymous” account. This took place on twitter and discord. The minor that I was texting with then reported me to an online vigilante gr… Continue reading Minor being reported to the police as a child predator for sexting another minor. What will happen to me? Please help [closed]
i lost 52k Worth of bitcoin to an investment website called Citadel_FX.
i deposited an initial investment of 30k, i made profit of 10k every 2 weeks after 6 weeks i tried to withdraw my profit. but i was told to make a 10 % deposit of the … Continue reading how to recover Bitcoin lost to investment [closed]
In the process of an investigation, I have to be able to prove that
an E-mail account of bob was used by alice to proceed to an
attack. And by the way alice presumably stole the bob password.
With many E-mail clients I am able to conduct s… Continue reading Attribution of origin of an E-mail attack from a Microsoft MX [closed]
It’s been a year since we launched our VirusTotal plugin for IDA Pro, followed by SentinelOne’s amazing contribution to the community with their VirusTotal plugin for GHIDRA (thanks again for the great job), inspired by the original IDA plugin but addi… Continue reading When you go fighting malware don´t forget your VT plugins