Analyze malwares which arrives over the Email, USB media. By examining the file content
Read More
Permanently remove important and critical files from your Computer storage, USB
Read More
This project is divided into two phases Static and Dynamic, here we will be using malware
Read More
Using Automated tool and backing up the last good known configuration of the system
Read More
Memory forensics is forensic analysis of a computer's memory dump.
Read More
Live Forensic includes assessing a system without performing imaging on it
Read More
Compromise assessments are high-level investigations where skilled teams
Read More
To analyze the Contacts , Call logs, Messages, Social Media data
Read More
The objective is to acquire an image of a system remotely via an agent.
Read More
Forensic Examiner will be provided an .E01 image of an abandon tablet
Read More
In this project your task is to analyze different voices and compare them
Read More
In this project investigator will need to clone/snapshot a Windows machines.
Read More
We will use Maltego which will search and capture as much information
Read More
In this project, investigator will need to assess Static and Dynamic malware analysis
Read More
In this project we will perform an experimental forensic study on multiple applications
Read More
This project is specifically designed to Windows based operating system
Read More
In this project we have used HACK-RF ONE which captures 10 MHZ to 5 Ghz of frequency
Read More
In this project we have used OPEN EDR project
Read More
A tool is required to perform a remote mirroring function for a client/server machine. A portable agent which will be executed in the server and connects back with its client.
Read More
A Web based application is required to be developed using PHP/ASP/JSP/WEBRTC in which Google Dorking and keywords based searching will be used to find any unofficial presence of a company is hosted over the internet. Note: there will be a whitelisting of company official domains, URL, Web Links. a part from them all should be collected and counted in a blacklist We have customize and added around 200+ domain in this open source tool called "Sherlock" use to populate data on behalf of usernames, email address, domain name.
Read More
This project allows a user to setup a domain using WEBRTC services which help to record video of the user using Cell phone, laptop having camera installed in it. Application would have the ability to record the live video of the victim front cam, ability to hide itself from being detected by any EndPoint Protection program. The Program has been developed using PHP language and WEBRTC Protocol with customize programming.
Read More
This project allows a user to setup a vulnerable USB drive for the victim, as soon as the hacker plug in the USB drive in the system, it automatically execute the script and copy all the important files including (pptx, xlsx, docx, pdf, jpg, png, gif, txt, zip) etc. from the system and make a copy of these files in the system by creating a Hidden folder, once the copying process is done it than starts compressing and protecting the copied data in the disk. As soon as the data is copied it finally starts uploading the data to the cloud The Program has been developed using batch script and assembly language
Read More
This project allows a user to setup a vulnerable and fake Office 365 webpage in order to deceive the victim. As soon as the victim clicks on the fake URL, it will popup a page claiming to be an office 365 page. forcing the victim to enter the credentials, as soon as the victim will enter the credentials it will send the credentials to Hackers Cloud The Program has been developed using PHP Language.
Read More
This project allows an intruder to setup an application and installed it in the victim machine. As soon as the victim will open the system it will automatically send public IP information to the hacker The Program has been developed using C#. Net.
Read More