P

Prof. K - Digital Forensics

14 Followers
    Dumping Wi-Fi Credentials Using netsh
    4:30
    Email Header Analysis
    16:50
    Using Shellbags to View Hidden or Deleted Folders
    5:42
    Memory Forensics Using the Volatility Framework
    18:46
    Install Ghidra on CSI Linux
    7:05
    Introduction to Using Ghidra
    14:15
    Creating a Virtual Install of CSI Linux v.2023
    9:45