Week 17 – 2025

Akash Patel Understanding Rootkits: The Ultimate Cybersecurity Nightmare and Direct Kernel Object Manipulation Understanding Userland Hooks and Rootkits in Real-World Investigations Extracting Memory Objects with MemProcFS/Volatility3/Bstrings: A Practical Guide Disk Imaging (Part 1) : Memory Acquisition & Encryption Checking Digital Forensics (Part 2): The Importance of Rapid Triage Collection — Kape vs FTK Imager Amped Forensic Fingerprint Analysis: […]

Week 16 – 2025

Akash Patel P13 Analyzing Safari Browser, Apple Mail Data and Recents Database Artifacts on macOS Intrusion Analysis and Incident Response on macOS: File Quarantine, Antivirus Mechanisms, and… P14 Using APOLLO for macOS investigation Christopher Eng at Ogmini Expectations vs Reality – Digital Forensic Science Master’s Degree Part 7 David Cowen Sunday Funday Challenge – Browser […]

Week 15 – 2025

Akash Patel Making Sense of macOS Logs(Part1): A User-Friendly Guide A Curious Case with SentinelOne: Same Rule, Different Behavior? P11 macOS Tracking Users Activity, Autoruns and Application-Level Firewall and Forensic Insights Bayaz NetDetection — Evidence Of Execution In Linux? Manny Kressel at BitmindzApple T2 Chip and Silicon Mac Acquisition using NBFTools NETRE Ben Bowman at Black Hills […]

Week 14 – 2025

Akash Patel Understanding Partitioning Schemes, FileVault 2 and macOS Encryption: A User-Friendly Guide P5: Exploring macOS Extended Attributes: The Hidden Metadata You Didn’t Know Existed || P6… P7 macOS File System Events: The Power of Spotlight Christopher Eng at Ogmini CISSP – Stalled Zeltser Challenge – Third Month Accomplishments CISSP – Domain 3 David Cowen […]