- Scan virtual machines or systems for artifacts
- Analyze email headers for validations.
- Analyze disk images or memory images
- Scan malware, suspicious files for clues
- Data recovery
- forensic network
- memory forensics
- Volatility analysis
- Smartphone forensics
- Forensic Toolkit (FTK)
- Guides and research writing
Please do not hesitate to contact me before placing the order to discuss and find the most accurate and possible solution to your problem.