Cryptography Digital Forensics Reverse Engineering
4
Transcript of Cryptography Digital Forensics Reverse Engineering
![Page 1: Cryptography Digital Forensics Reverse Engineering](https://reader035.fdocuments.us/reader035/viewer/2022071612/6156fdb8a097e25c764fce18/html5/thumbnails/1.jpg)
![Page 2: Cryptography Digital Forensics Reverse Engineering](https://reader035.fdocuments.us/reader035/viewer/2022071612/6156fdb8a097e25c764fce18/html5/thumbnails/2.jpg)
Cryptography
Digital Forensics
Reverse Engineering
Web Security
Exploitation
Network Security
Open Source Cyber Intelligence
-
![Page 3: Cryptography Digital Forensics Reverse Engineering](https://reader035.fdocuments.us/reader035/viewer/2022071612/6156fdb8a097e25c764fce18/html5/thumbnails/3.jpg)
CTFtime.org
here
Google CTF
Burp suite
Cookie EditorSQLMap
DirBusterXSSer
rsatoolCyberChef
PkCrackQuipQuip
XORTool
![Page 4: Cryptography Digital Forensics Reverse Engineering](https://reader035.fdocuments.us/reader035/viewer/2022071612/6156fdb8a097e25c764fce18/html5/thumbnails/4.jpg)
ExifTool
WiresharkJPEG, JPG, JPE
Audacity
Foremost Stegsolve Volatility
IDA Pro
DLLInjector libformatstr Metasploit one_gadgetPwntoolsQira
ROP GadgetV0lt