FTK Imager a Forensics Tools For MAC OS X
-
Updated
Jul 26, 2018
FTK Imager a Forensics Tools For MAC OS X
This report was written for the Digital Forensics Analysis coursework, specifically the first assignment. In which, steps and screenshots for each investigation process are recorded.
CLI Tools to open, extract and mount FTK Imager's AccessData AD1 forensic images on linux.
A tool written in AHK to automate FTK imager for collection purposes.
Memory Forensics & Malware Investigation using FTK Imager, Volatility & Autopsy
A collection of digital forensics lab reports covering Linux artifact recovery, shell history analysis, bash script forensics, and incident reconstruction using tools like SleuthKit, Auditd, and command-line utilities.
MFTrecover is a file recovery tool for the Windows NTFS 3.1 file system, used since Windows XP through the latest Windows 11. The tool works by parsing Master File Table (MFT) entries and directly accessing the raw volume to retrieve the data of deleted files.
Using FTK Imager to create and verify a forensic image of a USB drive.
Covert DD images to E01's using FTK Imager
CS6503 Digital Forensics
using FTK imager to extract data from disk
Forensic investigation of a 40 GB Seagate Barracuda HDD acquired via WiebeTech UltraDock v5.5. Includes full expert witness report, FTK acquisition log, and photographic exhibits.
Forensische Analyse eines selbst erstellten USB-Stick-Images – Rekonstruktion gelöschter und manipuliert gespeicherter Dateien mit Autopsy.
Computer forensic using autospy, wireshark, etc.
Forensische Analyse eines selbst erstellten USB-Stick-Images – Rekonstruktion gelöschter und manipuliert gespeicherter Dateien mit Autopsy.
Add a description, image, and links to the ftk-imager topic page so that developers can more easily learn about it.
To associate your repository with the ftk-imager topic, visit your repo's landing page and select "manage topics."