Skip to content
View ph1nx's full-sized avatar

Highlights

  • Pro

Block or report ph1nx

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Pinned Loading

  1. GDrive-Forensics GDrive-Forensics Public

    Forked from akhil-dara/GDrive-Forensics

    Digital forensics for Google Drive—done right. Identify, preserve, and document cloud evidence with hash verification, timeline reconstruction, and defensible reporting for typical DLP cases.

    Python

  2. RecycleBin-Forensic-Explorer RecycleBin-Forensic-Explorer Public

    Forked from akhil-dara/RecycleBin-Forensic-Explorer

    Browse Windows Recycle Bin from E01 forensic images with Explorer-style interface. Parse $I/$R artifacts, view deleted files in original folder structure, export with timestamps & hash calculation.…

    Python

  3. Volume-Shadow-Copy-Explorer Volume-Shadow-Copy-Explorer Public

    Forked from sujayadkesar/vscexplorer

    Volume Shadow Copy Explorer

    Python

  4. FAEP FAEP Public

    Forked from sujayadkesar/FAEP

    FAEP is an automated tool to extract and parse forensic artifacts from .E01 images automatically, with a clean GUI and minimal manual effort.

    Perl

  5. Image-Encryption-using-Pseudo-Random-Number-Generator-and-Elliptic-Curve-Cryptography Image-Encryption-using-Pseudo-Random-Number-Generator-and-Elliptic-Curve-Cryptography Public

    The paper titled "A secure authenticated image encryption scheme based on elliptic curve cryptography" proposes a robust method for securely transmitting images, particularly medical ones, by emplo…

    Python 2 1

  6. Image-encryption-using-3D-Logistic-Map-and-Improved-Chirikov-Map Image-encryption-using-3D-Logistic-Map-and-Improved-Chirikov-Map Public

    A novel image encryption algorithm implementing 3D Logistic Map and Improved Chirikov Map for secure and robust image encryption. Features enhanced security through chaotic mapping, high key sensit…

    MATLAB 7 1