Securinets 2025 — Lost File
Ransomware-style challenge requiring memory capture analysis and reverse engineering of an encryption tool to recover a deleted key.
Memory Forensics with Volatility 3
A complete beginner-to-intermediate guide to memory forensics using Volatility 3. Covers installation, essential plugins, process analysis, network artifact extraction, and memory-resident malware hunting.
QnQSec 2025 — Masks
Tracing a phishing attack chain from initial email delivery in Outlook to scheduled task persistence using Volatility 3 and AmCache forensics.