Windows Artifacts

Windows Artifacts taxonomy generated by the site skill importer.

2 skills
M
extracting-memory-artifacts-with-rekall

by mukul975

extracting-memory-artifacts-with-rekall guide for analyzing Windows memory images with Rekall. Learn install and usage patterns to find hidden processes, injected code, suspicious VADs, loaded DLLs, and network activity for Digital Forensics.

Digital Forensics
Favorites 0GitHub 0
M
extracting-browser-history-artifacts

by mukul975

extracting-browser-history-artifacts is a Digital Forensics skill for extracting browser history, cookies, cache, downloads, and bookmarks from Chrome, Firefox, and Edge. Use it to turn browser profile files into timeline-ready evidence with repeatable, case-focused workflow guidance.

Digital Forensics
Favorites 0GitHub 0