digital forensics

  1. SUB-ZER0

    AWESOME LIST OF OSINT TOOLS

    Hidden content
  2. SudoDragon

    GET IP ADDRESS OF SOMEONE EASILY.

    Do you need the IP of a specific person and you don't know how to get it? I have the solution: I AM HERE TO SHOW YOU A METHOD ON HOW TO GET A SPECIFIC IP ADDRESS. Before you unlock the content you need to know some social engineering (enough to convince someone to click one link). No, my...
  3. SudoDragon

    HOW TO TRACE LOCATION OF A PERSON BY CHATTING ON WHATSAPP, FACEBOOK, INSTAGRAM, SNAPC

    Hidden content
  4. SudoDragon

    ⭐ DOXING BASICS ⭐ A COLLECTION OF THE MOST USEFUL TOOLS FOR DOXING BY SOCIAL MEDIA ⭐

    Hidden contentHidden contentHidden content
  5. SUB-ZER0

    [☣️DOX☢️] [☄️⭐] GET PHONE NUMBER WITH JUST AN INSTAGRAM USERNAME [⭐☄️]

    Hi, I will drop you a tool and its source code to get the phone number of a victim with just his instagram username ! I've doxxed several people until today with this tool It's easy and there is a step-by-step guide ! Hidden content Virustotal link VirusTotal
  6. protectaccount

    Course Mastering Digital Forensics Essentials (

    The Mastering Digital Forensics Essentials specialization is designed to equip learners with a comprehensive, practical, and ethically grounded understanding of modern digital forensics principles, investigative methodologies, and forensic toolkits. Through this program, participants will gain...
  7. protectaccount

    Course Learning Cyber Incident Response and Digital Forensics

    If your organization is the victim of a cyberattack, are you ready to respond? In this course, cybersecurity trainer Jason Dion guides you through the basics of how to conduct an incident response, including how evidence is collected for further digital forensic investigation. Jason explains...
  8. protectaccount

    Course Digital Forensics for Pentesters – Hands-on

    Digital forensics is becoming very important in Cyber Security to detect and backtrack Black Hat Criminals. It is essential to remove Hackers’ malicious backdoors/malware and trace them back to avoid any possible future incidents. Digital forensics is becoming very important in Cyber Security to...
  9. REDEYE

    PHONE NUMBER OSINT_ TOOLS & TECHNIQUES

    Phunter is an osint tool allowing you to find various information via a phone number 🔎📞 Hidden content
  10. SudoDragon

    OSINT GUIDE EMAILS, NUMBERS, SOCIAL MEDIA, LOCATION AND MANY MORE FEATURES! [UPDATED]

    Hidden content
  11. SudoDragon

    [FREE] 85+ BILLION RECORDS OSINT DATABASE — EMAILS, PHONES, PASSWORDS, SOCIALS,...

    Hidden content > ? Test it out — you’ll be surprised what you can find on people around you! ? No signup | No credit card | No bullshit! [/HIDEREPLYREACT]
  12. SudoDragon

    MAIL SPOOFING WEBSITE - FAKE EMAIL SENDER

    Hidden content
  13. SudoDragon

    10 METHODS TO GRAB YOUR TARGETS IP

    Here are 10 different ways of grabbing someones IP address! Hidden content
  14. SudoDragon

    SOCIAL-MEDIA-OSINT FIND ANY INFO

    Hidden content
  15. SUB-ZER0

    BLACKBIRD TOOL – OSINT TOOL TO FIND ACCOUNTS USING USERNAME

    Blackbird is a user name enumeration tool.This is one of the best OSINT tools to find usernames across social media websites. Note: I recommend you to always use this and any other cracked software in a VM or any other Sandbox Environment! Hidden content Virustotal link VirusTotal
  16. SUB-ZER0

    BLACKBIRD | AN OSINT TOOL TO SEARCH FOR ACCOUNTS BY USERNAME IN SOCIAL NETWORKS

    Hidden content Virustotal link VirusTotal
  17. SUB-ZER0

    SNOOP PROJECT - OSINT NICKNAME SEARCH TOOLS

    This is the most powerful software taking into account the CIS location. Hidden content
  18. SudoDragon

    ☆ FOOTPRINTING AND RECONNAISSANCE ☆ FORENSIC HACKING ☆

    Hidden content
  19. SudoDragon

    ☆ SOCIAL ENGINEERING ☆ ETHICAL ☆ FORENSIC ☆

    Hidden content
  20. SUB-ZER0

    Cellebrite Phone forensics software and documentation from the Israeli company Cellebrite. 1.76TB

    Phone forensics software and documentation from the Israeli company Cellebrite. 1.76TB Hidden content
  21. Nightmare

    The World of Hacking 🌐💻🔒

    1/ Hacking is a term that often conjures images of cybercrime, but it's essential to distinguish between malicious activities and ethical hacking. Ethical hackers use their skills to identify and fix vulnerabilities, making the digital world more secure. Let's explore the different facets of...
  22. Nightmare

    HACKING AND PENTESTING BUNDLE

    HACKING AND PENTESTING BUNDLE: https://mega.nz/folder/BX5SBKrY#Qw4AcfRRYMwheNDdrRlkkw
  23. Nightmare

    OSINT SITES / TOOLS *STILL* USE

    https://www.aware-online.com/en/osint-tools OSINT Tools - Practical OSINT Tools - free of charge - Aware Online IntelTechniques Search Tool https://www.idcrawl.com https://fastpeoplesearch.com https://www.192.com (UK) WhatsMyName Web https://knowem.com
  24. Nightmare

    DarkWeb course - Udemy

    You'll learn to access dark web safely. You'll learn to access information with being anonymous to everyone. You'll learn to effectively use Tor Browser and Proxychain. https://www.udemy.com/course/introduction-to-dark-web-anonymity-and-cryptocurrency/
  25. Nightmare

    Battal Koç Etik Hacker Seti

    Hidden content
Top