Andrew Case's personal page for research, software projects, and speaking events. This website serves as a central location for all of my research, software projects, and speaking events. If you are interested in taking one of the training courses I teach or in having me speak at your event then please see the Contact page. An interview on my background and path into forensics can be found on Eric Huber's blog, A Fistful of Dongles. I am the Director of Research at Volexity. Read more about
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Instructions for setting up SIREN, including downloading Linux dependencies, cloning the repository, setting up virtual environment, installing pip requirements, running SIREN, setting up Snort on Pi, and MySQL setup.
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
Collection of cybersecurity conference videos recorded by Cooper (@Ministraitor)
A live archive of DEF CON CTF challenges, vulnerable by design, for hackers to play safely.
Comprehensive cheat sheet for SQLite SQL injection techniques and payloads.
A cybersecurity challenge where you play the role of an incident response consultant investigating an intrusion at Precision Widgets of North Dakota.
A practical guide to enhancing digital investigations with cutting-edge memory forensics techniques, covering fundamental concepts, tools, and techniques for memory forensics.
A comprehensive guide to reverse engineering by Dennis Yurichev, available for free download in multiple languages and formats, with praise from cybersecurity experts.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.