r/computerforensics

I am working on a pre-MVP evidence readiness artifact and would value practitioner feedback on the output model.
▲ 2 r/computerforensics+2 crossposts

I am working on a pre-MVP evidence readiness artifact and would value practitioner feedback on the output model.

Hello. I've shared feedback and blog posts before —some of you may remember-. For some time now, I've been developing a project related to the industry (CS & DFIR/IR), and thanks to the valuable feedback I've gathered from you, I've made significant progress.

I'm now in the phase of pre-MVP validation and gathering expert opinions. Thank you in advance, and I apologize if I've caused any inconvenience.

Question: The artifact is generated from existing security records and public fixture data. It includes source summaries, reliability reasons, limitation statements, manifests, hash lists, and package verification output.

Scope boundaries:

  • it does not claim legal admissibility;
  • it does not prove original source truth;
  • it is not a SIEM, DFIR lab tool, threat detector, or forensic acquisition tool;
  • it focuses on ingestion-onward integrity and handoff clarity.

The question is not "would you buy this product?" The question is whether this kind of package would help during IR, audit, insurance, legal, or internal investigation handoff.

Specific feedback I am looking for:

  1. Are source reliability and limitations clear enough?
  2. Does the artifact separate package integrity from upstream source trust?
  3. What uncertainty is still hidden?
  4. What would make this misleading or unusable in practice?

Artifact repo: https://github.com/tracehound/tracehound-pre-mvp-feedback-artifact Virustotal: https://www.virustotal.com/gui/url/dbdbf56e71c39fcfd158babdbb11b57037fa53b333efa27de619ce919278e66e?nocache=1

u/laphilosophia — 4 days ago

Pivoting from infosec to a DFIR focus?

Hi all. I’m getting out of a six year stint in the army in a few months, and I basically have a few years of threat hunting / IR experience behind me. I spent a lot of time hunting on ICS networks which meant I was basically pulling images with FTK and then doing log/memory analysis from there. I want to pivot into more DFIR specific work, but I’m not sure the best way to build on my experience. I can’t afford a SANS course, and I planned on going through 13cubed’s courses, but I sorta was wondering if there was a better alternative as I think I probably already know a decent amount of what’s in them.

If someone like me had $1.5/$2k to spend on training or a cert, what would be my single best option? I’d like good training as a basis, but I’d also like to be able to put a cert on my resume if it helps me get through the HR filters in the future.

I know this is an annoying question, so I apologize in advance. If anyone has any solid advice I’d really appreciate it though. Have a good night!

reddit.com
u/andrewmaster0 — 4 days ago

Those of you with remote imaging capabilities

My lab is looking at moving more of our casework to AWS. A lot of our clients still prefer shipping us devices for imaging, but ideally we'd like to move toward primarily remote collections.

I was curious how other labs are handling this. Right now we've mainly been using Magnet Response and recently got Cyber Triage but obviously those are more triage/artifact collection than a full image.

What tools are you all using for remote collections, and how often are you taking full images versus relying on triage-style artifact gathering from tools like Magnet Response or Cyber Triage?

I’m also curious how others handle internet connectivity concerns on infected systems. In our last DFIR engagement, the client had already isolated the hosts and was very against reconnecting them to push agents or collect remotely. We ended up having them run cyber Triage offline and upload the collected data to S3 instead. Im not against doing it that way but it does take a little longer.

How do you typically approach those conversations with clients, and what guidance do you give to balance containment concerns with the need for remote collection?

reddit.com
u/internal_logging — 6 days ago

Is this case doomed to fail?

Australian case - for legal jurisdiction reasons
DEI used to create forensic copies of seized devices in 2021.
def has placed news articles about DEI images being altered in the past before the court.

original devices and original forensic copies were lost in 2022.

a working copy of the data exists however has no chain of custody over 3 years and there exists no record of the hash values haven been taken from the original devices to confirm the data

is it even worth trying to pull the hash data from the working copy now and trying to introduce it or is the case pretty much doomed?

Do not want to be to specific and give any details on the case to avoid any legal issues.

reddit.com
u/Holiday_Skin_1670 — 6 days ago
▲ 23 r/computerforensics+1 crossposts

RDPuzzle: local browser-based RDP bitmap cache reconstruction with neural auto-stitching

Hey everyone - I built a DFIR tool called RDPuzzle and would really appreciate feedback from people who have worked with RDP bitmap cache artifacts.

It is a local, browser-based workspace for reconstructing 64x64 RDP cache tiles into larger readable images.

The main thing it adds is neural-assisted reconstruction: instead of only manually placing tiles, RDPuzzle ranks likely neighboring tiles and can auto-stitch regions using edge-similarity scoring plus a local ONNX edge-matching model.

Main features:

  • Loads RDP cache fragments, including BMC/BIN-style inputs
  • Manual and semi-automatic tile reconstruction
  • Neural-assisted neighbor suggestions
  • Auto-stitching of likely adjacent tiles
  • Fully local/browser-based processing
  • OCR for recovered text
  • Session save/load, undo/redo, and image export
  • Demo dataset included

GitHub:
https://github.com/BZDaniel/RDPuzzle

Live version:
https://bzdaniel.github.io/RDPuzzle/RDPuzzle.html

Remember to enable AI at the top right corner, and also i currently only recommend running the smaller AI model as the large one needs quantization to run realistically in a browser.

I’d especially appreciate feedback on workflow, validation concerns, parser edge cases, false-positive matches, and anything that would make it more useful in real forensic work.

u/SnooCapers2597 — 7 days ago
▲ 4 r/computerforensics+1 crossposts

Built a PE Malware Analysis Pipeline to Learn Why Most Detection Tools Suck at Correlation

I've been doing reverse engineering and malware analysis for sometime now, and I noticed something frustrating: every detection tool flags isolated signals separately. One tool screams "entropy is high!" Another yells "found injection APIs!" A third matches a YARA rule. But nobody tells you if these signals actually mean your binary is malicious or just legitimate software doing normal things.

So I built Binary Atlas—a static PE analysis engine that runs 14 detectors but scores confidence instead of just screaming alerts.

Why This Matters:

Most tools have insane false positive rates on legitimate Windows utilities

Single signals (high entropy, API imports, YARA matches) are meaningless in isolation

Correlation > Isolation

How It Works (5 Steps):

Check if Windows trusts it (valid Authenticode signature) → LOW risk

Parse PE headers, sections, imports, strings, hashes

Run 14 detectors (packing, anti-analysis, persistence, shellcode, etc.)

Unified classifier deduplicates findings and weights signals

Score confidence (HIGH/MEDIUM/LOW) + generate detailed reports

What Makes It Different:

Instead of: "Found CreateRemoteThread—FLAGGED!"

Binary Atlas does:

CreateRemoteThread detected ✓ (confidence: MEDIUM—debuggers use this)

WriteProcessMemory detected ✓ (confidence: MEDIUM—could be legitimate)

Registry persistence APIs detected ✓ (confidence: MEDIUM)

Anti-debug checks in strings ✓ (confidence: MEDIUM)

Unified result: "All 4 signals pointing toward injection + persistence = HIGH confidence malware"

The 14 Detectors:

Packing analysis | Anti-analysis detection | Persistence mechanisms | DLL/COM hijacking | Shellcode patterns | Import anomalies | Resource analysis | Mutex signatures | Overlay detection | String entropy | YARA scanning | Compiler identification | Threat classification | Security headers

Static analysis only ( To be honest sandboxin the file confirms everything)

High false positives on some legitimate software

Looking for feedback on:

How to reduce false positives further?

Which detection modules would be most useful?

Any malware researchers want to contribute better YARA rules?

Checkout Github: https://github.com/bilal0x0002-sketch/Binary-Atlas/

u/Ok_Performer1647 — 9 days ago
▲ 16 r/computerforensics+1 crossposts

AI+DFIR Challenge: Share Your Disasters and Successes

There is a lot of non-data driven discussions around using AI in investigations. Some people think it will be amazing. Some think its a disaster. A lot of other people are undecided.

The community needs data to help navigate this and I'm hoping you can help.

We launched a challenge a couple of weeks back.

  1. Submit anonymized screen shots of where AI was amazing, where it was a disaster, and where it was "meh...."
  2. Our panel of judges (skeptics and advocates) will review them
  3. The public will vote
  4. Winners get bragging rights
  5. All anonymous submissions are posted on github.

Judges:

  • Heather Barnhart (SANS)
  • Alexis Brignoni (LEAPPS)
  • Eric Capuano (Digital Defense Institute)
  • Brian Carrier (Sleuth Kit Labs – Organizer)
  • Filip Stojkovski (BlinkOps)

Full details are here:

https://www.cybertriage.com/blog/aidfir-2026-challenge-the-good-vs-the-ugly/

Please send in your best submissions!

u/brian_carrier — 10 days ago
▲ 59 r/computerforensics+2 crossposts

I've been building a Windows event log analysis tool called EventHawk and just shipped v1.2. Sharing here for feedback from people who work in IR/forensics.

What it is:

A GUI + CLI tool for parsing and analyzing .evtx files. Built around a Rust-backed parallel parser with a resource monitor that throttles workers automatically so your machine stays usable mid-parse. Supports EVTX from Windows Vista through Server 2022. Parses and filters 6M rows of event logs in just 50-60 secs.

Two parsing modes:

  1. Normal Mode loads matched events into memory — fast and straightforward for most investigations.

  2. Juggernaut Mode is for large captures: raw event XML goes to Parquet on disk, only metadata columns live in memory, full event detail lazy-loads on row click. Scroll 10M+ events with zero disk I/O.

v1.2 rewrote Juggernaut Mode from scratch — replaced the old multi-DuckDB connection model (OOM crashes, file lock conflicts) with a single Arrow in-memory table and filter thread. Filtering now runs as vectorized DuckDB SQL, 20-120ms at 6M rows.

Key features:

  1. 20 built-in DFIR profiles — filter at parse time. Logon/Logoff, Process Creation, Lateral Movement, PowerShell, RDP, Defender Alerts, and 13 more.

  2. 273+ event ID descriptions in plain English on click. No more looking up what 4688 or 7045 means mid-investigation.

  3. ATT&CK tab — every parse maps events to MITRE techniques with ID, tactic, confidence, and source. Click any technique to filter the table to events that triggered it.

  4. IOC tab — auto-extracts IPs, domains, file paths, hashes, URLs, registry keys, and suspicious command lines. Click any IOC to pivot the entire event table to events containing that indicator.

  5. Chains tab — correlates events into multi-step attack chains shown as an expandable tree. Click any node to jump to that event.

  6. Case tab — annotate events with analyst notes, export as a formal PDF investigation report.

  7. Hayabusa integration — ~3,000 community Sigma rules evaluated and merged into the ATT&CK tab.

  8. Sentinel anomaly engine — build a behavioral baseline from clean logs, then score a suspect capture. Each process-create event scored across five dimensions and classified into four tiers. Tier 3/4 findings include plain-English justifications. Built for novel malware, LOLBin abuse, and anything that slips past signatures.

  9. Export in 8 formats — JSON, CSV, XML, HTML, PDF report, STIX 2.1, OpenIOC, YARA.

  10. Full CLI and TUI for headless and automated use.

If the tool looks useful, a star on GitHub goes a long way ⭐⭐ — it helps the project get visibility and keeps me motivated to keep building. Would genuinely love feedback from anyone, especially on what's missing or annoying in the existing ecosystem.

u/kakkaarot — 12 days ago
▲ 22 r/computerforensics+2 crossposts

Announcing Crow-Eye v0.10.0: The AI forensics assistance

I am proud to announce the release of Crow-Eye v0.10.0. This milestone marks the official launch of The Eye a robust intelligence layer designed to integrate your own AI agents directly into Crow-Eye, This isn't just a regular update; it’s a massive milestone for us . My goal from day one has been to build an ecosystem that doesn't just chase known signatures, but actually gives investigators the power to hunt zero-days

But as we celebrate this release and introduce our new AI layer, we need to talk about the elephant in the room.

The Problem with AI in Forensics

There’s a huge rush right now to slap AI onto cybersecurity tools, and honestly, a lot of it is dangerous. We are seeing "black box" solutions where investigators feed raw data into an LLM and just trust the answers it spits out.

In DFIR, an AI hallucination can ruin a case. An answer without mathematical, binary proof is worthless. If an AI agent cannot anchor its reasoning to exact offsets, hashes, and unmanipulated timestamps, we cannot trust it. To fix this, I realized we had to architect a system where the AI is bound by the exact same strict evidentiary rules as a human analyst.

The Starting Line: Automated Triage

Before the AI even wakes up, Crow-Eye does the heavy lifting. When you launch The Eye, the platform immediately runs a high-speed Automated Triage phase.

It queries the underlying SQLite databases to map out the ground truth: active users, execution histories, accessed files, USB devices, and Auto Run configs. This builds a comprehensive Initial Report. This report isn't the final investigation it’s the baseline. It’s the verified starting line before we let the AI touch the data.

The Brain of "The Eye"

I believe you should have total control over your data and your analytical "brain." That’s why The Eye is completely modular. You can plug in whatever intelligence fits your environment:

  • Cloud AI Models: Hook up your public API keys for high-performance reasoning.
  • Offline Servers & Local Inference: For air-gapped labs where privacy is non-negotiable.
    • Dev Note: A lot of my testing and development for The Eye was actually done using LM Studio and Google’s open-weights models (like the Gemma family). If you're a solo investigator, running Gemma locally on your own machine is incredibly powerful. Just a tip: push your context window as high as possible to handle the dense forensic payloads!
  • CLI Agents: If you are a developer or researcher, you can hook up your own custom-built local agents, or seamlessly pipe in tools like Claude Code and the Gemini CLI.

https://preview.redd.it/zdg32192ic0h1.png?width=2023&format=png&auto=webp&s=a1458500b3765ccb1a7fb4018a9dcd2203bd7a1a

Keeping the AI Honest: The Ghassan Elsman Protocol (GEP)

Triage gives us the data, but the Ghassan Elsman Protocol (GEP) ensures the AI doesn't mess it up. The GEP is a strict set of rules hardcoded into the workflow to maintain a perfect chain of custody:

  1. Case Awareness: The Initial Report is injected directly into the prompt to ground the AI in reality.
  2. Pre-Flight Ping: Validates backend connectivity to stop silent failures.
  3. Evidence Anchoring: Automatically tags and preserves raw hashes, IPs, and timestamps in the chat history.
  4. Chain of Custody: Every truncation or data preservation event is meticulously logged.
  5. Non-Repudiation: Messages are assigned deterministic, hash-linked IDs so records can't be altered.
  6. Context Pinning: Critical evidence is locked and excluded from automated AI summarization.
  7. Tool Traceability: Every tool the AI uses (like querying LOLBAS) is logged with exact execution counts.
  8. Machine-Readable Synthesis: You get a clean JSON audit trail at the end to prove compliance.

What's Next: Bridging Analysis and Anatomy

While The Eye handles the high-speed analysis, our educational hub, Eye Describe, In upcoming updates, we are going to start building a bridge between these two tools. The goal is to gradually integrate visual references alongside the AI's findings. We want to reach a point where the AI doesn't just give you an answer, but helps point you toward the structural anatomy of the artifact it analyzed. It’s an iterative, ongoing project, but we believe it is an important step toward total forensic transparency.

This is the very first release of The Eye. You might hit a few bumps connecting to certain local backends or managing specific CLI tools, but we are actively squashing bugs and refining the experience over the next few weeks. Please submit any issues you find!

The latest source code and release are available right now on our GitHub. For those waiting for the compiled .exe version, it will be dropping very soon on our official website.

GitHub : https://github.com/Ghassan-elsman/Crow-Eye

good hunting

reddit.com
u/Ghassan_- — 11 days ago

Looking to get foot in door as a digital investigator

Hello, I'm a recent computer science grad and also hold an advanced diploma in computer security and investigations and am looking to start a career with law enforcement as a digital investigator. I am specifically looking to work with the Ontario Provincial Police or the Canadian Federal police (RCMP).

I have hands on experience using kali linux, FTK, and EnCase from school as well as taking several law courses to learn best practices such as chain of custody.

My question is does anyone know where to start the actual application process as there have not been any civilian job postings as far as I have ever seen. I am just looking for a way to get my foot in the door.

reddit.com
u/doromo — 13 days ago