Skip to navigation Skip to content Network IntelligenceNetwork Intelligence
Menu
  • Practices
    • Advanced Detection and Response
    • Continuous Threat Exposure Management
    • Governance Risk Management & Compliance
    • IoT and OT
    • Privacy Assurance
    • Responsible AI
    • Secure Digital Transformation
    • Zero Trust
  • Services
  • Resources
    • Blogs
    • Cybersecurity 101
    • Webinars
    • Whitepapers
    • Case Studies
    • Newsletters
    • Security Advisories
  • Partnerships
  • About Us
  • Contact Us
    • Career
Talk to an Expert
Transilience Talk to an Expert

Home » Anti-Forensics

  1. Home
  2. Anti-Forensics

Category: Anti-Forensics

Anti-Forensics Hacks Incident Response Malware Analysis Penetration Testing Research Security Testing

Malware on Steroids Part 3: Machine Learning & Sandbox Evasion

Hey, It’s been a busy month for me and I was not able to save time to write the final […]

17 May, 2025
2
Anti-Forensics Hacks Incident Response Malware Analysis Penetration Testing Security Testing

Malware on Steroids – Part 2: Evading Antivirus in a Simulated Organizational Environment

Recap In the previous post, we wrote a simple CMD Reverse Shell over TCP. However, in a real-life scenario, things […]

17 May, 2025
Malware on Steroids 1
Anti-Forensics Hacks Incident Response Malware Analysis Penetration Testing Security Testing

Malware on Steroids – Part 1: Simple CMD Reverse Shell

The Prologue This is my reposting of the blog series I wrote here at ScriptDotSh If you haven’t watched the […]

17 May, 2025
Anti-Forensics Compromise Detection Disk Forensics Fundamentals

Understanding Index.dat (Internet History Data File in Windows)

by Bhushan Shah, NII Consulting The index.dat is a file which contains the list of the websites that one has […]

17 May, 2025
5
Anti-Forensics Fundamentals Network Forensics

Protecting your pot of gold

Securing your passwords against Rainbow Table Attacks By Bhushan Shah, NII Consulting In the previous article we looked at the […]

17 May, 2025
1
Anti-Forensics Disk Forensics

UserAssist Revisited!

By Chetan Gupta, NII Consulting In my previous article on Userassist, I had mentioned how UserAssist records user access of […]

17 May, 2025
6
Anti-Forensics Fundamentals Tools

The top 100 security tools

Penetration Testing Fyodor’s back with his top 100 security tools for 2006. One of the most significant, but not surprising, […]

17 May, 2025
1
Anti-Forensics Tools

Timestomp.exe

By Chetan Gupta, NII Consulting A supposedly nightmarish tool for the investigator community! Recently this tool was released at the […]

17 May, 2025
3

Sidebar

Recent Posts

  • Robust Cyber Security Solutions to Prevent AttacksJune 19, 2025
  • Impact of AI on Cybersecurity JobsJune 18, 2025
  • Comprehensive Data Security Solutions for EnterprisesJune 18, 2025

Categories

  • All Topics
  • Digital
  • Marketing
  • Startups
  • Technology
  • Business

Tags

AI-Driven Defense Cloud Computing Cloud Infrastructure Cloud Security cybersecurity Cyber Security hacking Penetration Testing

Follow us

  • LinkedIn
  • Facebook
  • Twitter
  • Instagram
  • YouTube

Network Intelligence delivers a comprehensive suite of AI-powered cybersecurity solutions built on the ADVISE framework.  visualize, implement, sustain, and evolve your organization’s security posture.

Facebook-square Linkedin Instagram Youtube
Company
  • Practices
  • Services
  • Partnerships
  • About Us
  • Policies
  • Leadership
  • Blogs
  • Practices
  • Services
  • Partnerships
  • About Us
  • Policies
  • Leadership
  • Blogs
Subsidiaries
  • Transilience
  • Ilantus
  • IISecurity
  • Transilience
  • Ilantus
  • IISecurity
Trainings
  • NI Training
  • BCI Training
  • NI Training
  • BCI Training
Contact us

contact@networkintelligence.ai

Subscribe To Our Newsletter

© Network Intelligence - All rights reserved | Terms & Conditions | Privacy Policy
Top