Mindblown: a blog about DFIR.

  • Forensic image formats

    Forensic image formats are used for preserving digital evidence during digital forensic investigations. These formats ensure that the original data is maintained in a reliable and unaltered state, allowing investigators to analyze the evidence without affecting its integrity.

  • JIPOE

    Joint Intelligence Preparation of the Operational Environment (JIPOE) is a methodology utilized by military and intelligence organizations to analyze and comprehend the operational environment, including its application in the cybersecurity context through the Threat Intelligence Model.

  • NirSoft 4n6 tools P2

    NirSoft tools are a collection of small and useful freeware utilities developed by Nir Sofer. These utilities cover various areas, including password recovery, system utilities, network tools, and web browser tools.

  • NirSoft 4n6 tools P1

    NirSoft tools are a collection of small and useful freeware utilities developed by Nir Sofer. These utilities cover various areas, including password recovery, system utilities, network tools, and web browser tools.

  • Linux 4n6 tools P1

    Linux forensics tools are a collection of utilities and software designed to assist digital forensic investigators in collecting, analyzing, and preserving digital evidence on Linux-based systems.

  • OWASP SAMM

    OWASP SAMM, or the Software Assurance Maturity Model, is an open framework designed to help organizations formulate and implement a software security strategy tailored to their specific risks. This model allows organizations to evaluate their existing software security practices and integrate a strategy for software security into their existing Software Development Lifecycle (SDLC). The primary…

  • Security Development Lifecycle (SDL)

    The Security Development Lifecycle (SDL) is a software development process that incorporates security practices and principles into every stage of the software development lifecycle to ensure that applications are designed, developed, and tested with security in mind. The goal of SDL is to reduce the number and severity of vulnerabilities in software, improve software quality,…

  • DoD Methodology for DevSecOps

    The DoD Methodology for DevSecOps is an approach adopted by the U.S. Department of Defense (DoD) to integrate security into every aspect of the software development lifecycle, breaking down silos and unifying software development, deployment, security, and operations. The DoD Enterprise DevSecOps Strategy Guide provides an executive summary of DevSecOps, establishing a set of strategic…

  • Application Security Verification Standard ASVS

    The Application Security Verification Standard (ASVS) is a project by OWASP that provides a framework of security requirements and controls for designing, developing, and testing modern web applications and services. ASVS serves as a basis for testing web application technical security controls and offers developers a list of requirements for secure development. It is a…

  • Digital Forensics Services: What You Need to Know

    What is Digital Forensics? Digital forensics collects and analyzes data from a computer or other digital device. Digital forensic examiners use their expertise to determine whether evidence has been tampered with or altered and, if so, by whom. They also try to determine what happened on that computer or device at a particular time to…