Because One Book Isnβt Enough!
Hack, Track & Snack
About The Project
Books:
Casey, E. (2011). Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet. Academic Press.
Nelson, B., Phillips, A., & Steuart, C. (2018). Guide to Computer Forensics and Investigations. Cengage Learning.
Ligh, M., Case, A., Levy, J., & Walters, A. (2014). The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory. Wiley.
Sikorski, M., & Honig, A. (2012). Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software. No Starch Press.
Sammons, J. (2015). The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics. Syngress.
Soltani, R. (2023). Mastering Mobile Forensics. Packt Publishing.
Easttom, C. (2018). Computer Security Fundamentals. Pearson IT Certification.
Research Papers & Reports:
National Institute of Standards and Technology (NIST). (2006). Guide to Integrating Forensic Techniques into Incident Response (SP 800-86). https://csrc.nist.gov/publications/detail/sp/800-86/final
Scientific Working Group on Digital Evidence (SWGDE). (2023). Best Practices for Digital Forensics. https://www.swgde.org
Garfinkel, S. (2010). Digital forensics research: The next 10 years. Digital Investigation, 7, S64-S73.
Europol. (2022). Internet Organised Crime Threat Assessment (IOCTA). https://www.europol.europa.eu
US-CERT. (2018). Incident Handling Guidelines. Cybersecurity and Infrastructure Security Agency (CISA).
Web Resources:
National Institute of Standards and Technology (NIST) - https://www.nist.gov
SANS Digital Forensics & Incident Response (DFIR) - https://www.sans.org/digital-forensics/
Forensics Wiki - https://forensicswiki.org
DFIR Training - https://www.dfir.training
The Tor Project (Dark Web Investigations) - https://www.torproject.org
VirusTotal (Malware Analysis) - https://www.virustotal.com
Hybrid Analysis - https://www.hybrid-analysis.com
MITRE ATT&CK Framework - https://attack.mitre.org
π Books & Research Papers
Computer Forensics: Cybercriminals, Laws, and Evidence - Marjie T. Britz
Incident Response & Computer Forensics - Kevin Mandia, Chris Prosise
The Web Application Hackerβs Handbook - Dafydd Stuttard, Marcus Pinto
Hacking: The Art of Exploitation - Jon Erickson
Digital Evidence and Computer Crime - Eoghan Casey
Practical Malware Analysis - Michael Sikorski, Andrew Honig
Social Engineering: The Science of Human Hacking - Christopher Hadnagy
The Basics of Digital Forensics - John Sammons
Cybersecurity Essentials - Charles J. Brooks
Forensic Examination of Digital Evidence: A Guide for Law Enforcement - US Department of Justice
Mobile Forensics: Advanced Investigative Strategies - Oleg Skulkin
π Websites & Online Resources
National Institute of Standards and Technology (NIST) Cybersecurity Framework - https://www.nist.gov/cyberframework
SANS Digital Forensics & Incident Response (DFIR) - https://www.sans.org
Forensic Focus - Digital Forensics News & Forums - https://www.forensicfocus.com
DFIR Training - https://www.dfir.training
Open Web Application Security Project (OWASP) - https://owasp.org
MITRE ATT&CK (Cyber Threat Intelligence Framework) - https://attack.mitre.org
Exploit Database (Offensive Security) - https://www.exploit-db.com
NIST National Software Reference Library (NSRL) - https://www.nsrl.nist.gov
π Online Courses & Certifications
Certified Ethical Hacker (CEH) - EC-Council
GIAC Certified Forensic Examiner (GCFE) - SANS Institute
Cybersecurity & Digital Forensics Courses - Coursera, Udemy, Pluralsight
Google IT Support & Cybersecurity Professional Certificates - Google / Coursera
IBM Cybersecurity Analyst Professional Certificate - IBM / Coursera
DFIR and Incident Response Courses - SANS, Magnet Forensics, Autopsy Training
π Forensic Investigation Tools
Autopsy - GUI-based digital forensics tool
FTK (Forensic Toolkit) - By AccessData, for comprehensive digital forensics
Magnet AXIOM - Advanced forensic software
EnCase Forensic - Digital evidence analysis tool
X-Ways Forensics - Lightweight, powerful forensic tool
Oxygen Forensic Suite - Mobile forensic tool
UFED (Cellebrite) - Mobile forensic extraction tool
MOBILedit Forensic - Mobile forensic tool
Paraben E3 - Digital investigation platform
π½ Hard Disk & File Recovery
TestDisk & PhotoRec - Open-source recovery tool
R-Studio - Data recovery forensics tool
Recuva - Simple file recovery
FTK Imager - Disk imaging & evidence preservation
Magnet AXIOM - Data recovery
π± Mobile Forensics & Analysis
Cellebrite UFED - Mobile device extraction
Elcomsoft Phone Breaker - Password recovery for mobile devices
Oxygen Forensic Detective - Mobile forensics suite
ADB (Android Debug Bridge) - Android forensic investigations
π¬ Memory & RAM Forensics
Volatility Framework - Memory forensics & malware analysis
Rekall - Advanced memory forensic framework
Belkasoft Ram Capturer - Memory Capture
π‘ Network Analysis & Traffic Capture
Wireshark - Network packet analysis
tcpdump - Command-line packet analyzer
NetworkMiner - Network forensic analysis
π Password Recovery & Cracking
John the Ripper - Password cracking tool
Hashcat - GPU-accelerated password recovery
Cain & Abel - Legacy password recovery tool
Ophcrack - Windows password cracker
π§ Email & Internet Forensics
MailXaminer - Email investigation software
Forensic Email Collector - Email metadata extraction
Thunderbird Email Forensics - Open-source email analysis
π Malware Analysis & Reverse Engineering
IDA Pro - Interactive Disassembler for reverse engineering
Ghidra - NSAβs open-source reverse engineering tool
x64dbg - Debugger for analyzing malware behavior
Cuckoo Sandbox - Automated malware analysis
π Incident Response & Threat Hunting
Velociraptor - Digital forensics & threat hunting tool
TheHive - Open-source incident response platform
MISP (Malware Information Sharing Platform) - Threat intelligence sharing
π₯οΈ Operating Systems & Distros for Forensics
Kali Linux (Kali Purple) - Pentesting & forensic distro
SIFT Workstation
Parrot Security OS - Lightweight alternative to Kali
CAINE (Computer Aided Investigative Environment) - Forensic-focused Linux distro
π Metadata & Document Analysis
ExifTool - Extract metadata from images & documents
PDF Stream Dumper - Analyze malicious PDFs
OfficeMalScanner - Scan Microsoft Office documents for malware
π· Image & Video Forensics
Amped FIVE - Video forensics tool
Forensic Image Analysis (FIAT) - Image forensics framework
GIMP / Photoshop Forensics Plugins - Image analysis techniques
π More Learning & Community Resources
DFIR Discord Communities & Forums
Reddit r/Netsec & r/ComputerForensics
LinkedIn Groups on Digital Forensics & Incident Response
YouTube Channels (SANS DFIR, LiveOverflow, NetworkChuck)
Achievements
Β© 2025 Vaidik Patidar | You scrolled all the way down? Get a life.
