Found 9 repositories(showing 9)
bablerpaul
FORENSIC TOOL FOR META DATA EXTRACTION
osamaeid908
The "Osama Eid - Forensic" project is a forensic tool designed to analyze and extract metadata from digital sources. It collects timestamps, author data, and geolocation, aiding cybersecurity and law enforcement investigations with user-friendly reporting features.
raja045
A project leveraging metadata extraction, machine learning, and visualization tools to automate and enhance image forensics for criminal investigations.
Simple PoC for cloud forensics (study project; IMT4114) using the Google Drive API to retrieve files meta data and file changes, outputting it to JSON.
Shivam01001
This project is mainly focused on Digital forensics applications , this will recover alll the deleted files form the system alng with meta data with the sucess ratio of 97.85% , it supports almost all the tyoes of file type
Bbales223
meta data forensic application
UnethicalOperator
Gov Level Forensic Data And Meta Scrubber, Os, Drives And Hardware
syedazizahmed
InstaTrace is a proof-of-concept (POC) forensic tool that demonstrates how image URLs from Instagram private profiles were historically exposed in embedded timeline data due to a now-patched vulnerability. This project is for educational and security research purposes only. The issue demonstrated here was patched by Meta in late 2025
A large technology say they've been hacked! Luckily their forensic engineers have grabbed valuable data about the hacks, including information like session time,locations, wpm typing speed, etc. The forensic engineer relates to you what she has been able to figure out so far, she has been able to grab meta data of each session that the hackers used to connect to their servers. The technology firm has 3 potential hackers that perpetrated the attack. Their certain of the first two hackers but they aren't very sure if the third hacker was involved or not.Using the tool of Pyspark with help of KMeans we are building two Clusters one with k=2 and one with k=3 .After the deployment it is proved that in k=2 the group of hackers(predictions) are even so the number of hackers are two.
All 9 repositories loaded