186
CTFs & Images
Overview This page contains links to dd images used for testing by CFTT of software applications...
197
CTFs & Images
Overview This page contains links to dd images for the use of testing software applications with...
205
CTFs & Images
This page contains links to compressed dd images used to test metadata based deleted file recovery forensic tools. Metadata...
168
CTFs & Images
This page has linkes to two dd images containing container files: files --- (MD5) 6782bae87146dd8bb4dc06ee7462d572 nests...
177
CTFs & Images
The following tools: Micro Systemation GSM .XRY v3.6, Guidance Software's Neutrino v1.4.14, Paraben's Device Seizure v2.1 build 3079.29886, Cellebrite...
172
CTFs & Images
The following binary images were created by performing either a JTAG or Chip-off data extraction technique. The...
169
The files contained in this archive can be used as a control to test the accuracy and effectiveness of...
201
CTFs & Images
Five memory images were created by Jesse Kornblum of ManTech . The archive, a .RAR file, (http://www.rarlab.com/) contains images...
176
CTFs & Images
The Rhino Hunt data set requires examination of a small image file and three network traces. This image...
174
CTFs & Images
This image (Encase, iLook, compressed dd) is to evaluate if an imaging tool can recognize the file systems...
162
String Search Test Data for use with Federated Testing 4.0 and later.
202
CTFs & Images
The evil Boris and Natasha have escaped from jail and are up to their old tricks. They have stolen...
187
CTFs & Images
Background The drone images, research results and data on this page were produced as part of the...
166
The Windows registry is a system-defined database in which applications and system components store and retrieve configuration data. The...
257
The purpose of this work is to learn various types of data leakage, and practice its investigation techniques. ...
175
CTFs & Images
On 09/20/04 , a Dell CPi notebook computer, serial # VLQLW, was found abandoned along with a wireless PCMCIA...
164
Data Sets The National Security Agency permitted both the recording and release of the following datasets. ...
163
CTFs & Images
This is a public resource for the improvement of students and professionals alike. We have released full Virtual Machine...
162
CTFs & Images
The Information Security Talent Search is a college security competition designed and ran by students, for students. ...
196
CTFs & Images
The U.S. National CyberWatch Mid-Atlantic Collegiate Cyber Defense Competition (MACCDC) is a unique experience for college and university students...