|
1. Andriller Tool Use Case |
21. OSForensics Tool Use Case |
|
2. Blurity Tool Use Case |
22. Procmon Tool Use Case |
|
3. Browser history examiner Tool Use Case |
23. Process Explorer Tool Use Case |
|
4. Bulk Extractor Tool Use Case |
24. Recuva Tool Use Case |
|
5. Disk wipe Tool Use Case |
25. Redline Tool Use Case |
|
6. Exiftool Tool Use Case |
26. Rufus Tool Use Case |
|
7. File Matadata Tool Use Case |
27. Splunk Tool Use Case |
|
8. Hash Calc Tool Use Case |
28. Sys Analyzer Tool Use Case |
|
9. Hash My file Tool Use Case |
29. TCP view Tool Use Case |
|
10. Helix Tool Use Case |
30. Tor Tool Use Case |
|
11. Hex editor Neo Tool Use Case |
31. Unknown_File_Hunter Tool Use Case |
|
12. HxD Tool Use Case |
32. USB Device View Tool Use Case |
|
13. Jpeg Snoop Tool Use Case |
33. Veracrypt Tool Use Case |
|
14. Kernel for Exchange Server Tool Use Case |
34. Volatility Tool Use Case |
|
15. Log parsar Tool Use Case |
35. WFA Tool Use Case |
|
16. Magnet RAM Capture Tool Use Case |
36. Win Audit Tool Use Case |
|
17. Maltego Carbon Set Up Tool Use Case |
37. Win IP Config Tool Use Case |
|
18. Malwarebytes Tool Use Case |
38. WIRESHARK Tool Use Case |
|
19. Manage Engine Desktop Tool Use Case |
|
|
20. Network Miner Tool Use Case |
40. MD5 Summer Tool Use Case |

Access the Virtual Cyber Lab
