top of page

Please access this website using a laptop / desktop or tablet for the best experience


Comprehensive Guide to Identifying Application Execution in Windows Forensics
When investigating digital forensics cases, confirming application execution is crucial. Whether analyzing malware execution, tracking...
-
Feb 17, 20242 min read


LECmd: A Powerful Tool for Investigating LNK Files
This article have been updated on 22 January 2025 When investigating user activity on a Windows system, LNK (shortcut) files serve as a...
-
Feb 16, 20244 min read


Windows LNK Files: A Hidden Treasure for Forensic Investigators
When investigating digital forensics on a Windows system, LNK (shortcut) files serve as one of the most valuable sources of user...
-
Feb 15, 20244 min read


Analyzing Recycle Bin Metadata with RBCmd and $I_Parse
When investigating deleted files on a Windows system, analyzing the Recycle Bin metadata can provide crucial insights. In this guide,...
-
Feb 14, 20242 min read


Windows Recycle Bin Forensics: Recovering Deleted Files
The Windows Recycle Bin is an important artifact in forensic investigations . When a user deletes a file using the graphical interface,...
-
Feb 13, 20242 min read


Unlocking ShellBags Analysis with ShellBags Explorer (SBE) / SBECmd.exe
ShellBags can provide invaluable insights into a user’s activity— helping forensic analysts reconstruct deleted folders, track accessed...
-
Feb 12, 20245 min read


Understanding ShellBags: A Forensic Goldmine in Windows Investigations
When investigating user activity on a Windows system, ShellBags are one of the most powerful yet misunderstood forensic artifacts....
-
Feb 11, 20243 min read


Mastering JLECmd for Windows Jump List Forensics
Windows Jump Lists are a goldmine for forensic investigators, offering detailed insights into file access, user activity, and...
-
Feb 10, 20244 min read


Windows Taskbar Jump Lists: A Forensic Goldmine
Jump Lists are one of the most overlooked yet powerful artifacts in Windows forensic investigations. Introduced in Windows 7 , they...
-
Feb 9, 20246 min read


Unveiling Suspicious Files with DensityScout
Introduction DensityScout, a robust tool crafted by Christian Wojner at CERT Austria, stands at the forefront of digital forensics and...
-
Feb 9, 20242 min read


KAPE: A Detailed Exploration
Introduction: KAPE, can be used in graphical user interface (GUI), and can be used via the command line interface (CMD). Users typically...
-
Feb 7, 20244 min read


Glimpses of Brilliance: Kape
Introduction: KAPE, crafted by Eric Zimmerman, stands as a powerful, free, and versatile triage collection and post-processing tool...
-
Feb 6, 20242 min read


Unveiling System Secrets with WinPmem(memory acquisition tool)
Exploring WinPmem WinPmem is a robust memory acquisition tool designed specifically for Windows environments. Its primary function is to...
-
Feb 5, 20242 min read


Windows Hibernation Files: A Critical Artifact for Forensic Investigations
Introduction Windows hibernation files are an essential artifact in digital forensic investigations, often overlooked yet highly...
-
Feb 4, 20243 min read


Unleashing the Power of EvtxECmd: Windows Event Log Analysis
If you’ve ever tried digging through Windows event logs, you already know the pain — thousands of entries, confusing structures, and XML data that can make your head spin. Now imagine doing that for dozens or hundreds of systems during an investigation. That’s where EvtxECmd , created by Eric Zimmerman , becomes a real lifesaver. At first glance, EvtxECmd looks like another command-line tool that converts .evtx files into CSV, XML, or JSON formats. But once you start using it
-
Feb 3, 20244 min read


Understanding Amcache.hve: A Powerful Forensic Artifact
Introduction to Amcache.hve With the introduction of Windows 8 and later versions, Microsoft replaced the older RecentFileCache.bcf...
-
Feb 2, 20244 min read


Understanding AppCompatCache tool for ShimCache Forensic Analysis
Introduction to AppCompatCache AppCompatCache, also known as ShimCache, is a valuable forensic artifact in Windows systems that helps...
-
Feb 1, 20242 min read


Understanding Microsoft’s Application Compatibility Cache (ShimCache) in Digital Forensics
Updated on 13 Feb,2025 Introduction to AppCompatCache In the realm of digital forensics, one of the most valuable artifacts for tracking...
-
Jan 31, 20244 min read


Prefetch Analysis with PECmd and WinPrefetchView
Windows Prefetch is a critical forensic artifact that helps track program execution history . While Prefetch files can be manually...
-
Jan 30, 20243 min read


Windows Prefetch Files: A Forensic Goldmine for Tracking Program Execution
Windows Prefetch is one of the most valuable forensic artifacts for tracking program execution history . By analyzing Prefetch files,...
-
Jan 29, 20244 min read
bottom of page