Skip to content
  • Train & Certify
      • Certified Ethical Hacker

      • Digital Forensics

      • Programming

      • Reverse Engineering

      • Software Defined Radio

      • List All Courses

  • Degrees
      • Master's in Computer Science

      • Master's in Cyber Security

      • Master's in Artificial Intelligence

      • Master's in Digital Forensics and IR

      • Master’s in Secure Embedded Systems

  • Students
      • Cybersecurity and Ethical Hacking Articles

      • Digital Forensics and Network Analysis Articles

      • Software Defined Radio and Wireless Communication Articles

      • Cybersecurity Blog of the Day

  • Library
  • Labs
Login
  • December 18, 2025

p5.4_final_report.pdf // Writing the Final Forensic Report

  • December 18, 2025

p5.3_anti_forensics.wipe // Identifying When a Suspect Tried to Wipe Their Tracks

  • December 18, 2025

p5.2_super_timeline.log // Creating the “Super Timeline” (log2timeline)

  • December 18, 2025

p5.1_file_carving.hex // Recovering Images and Docs by their “Magic Bytes”

  • December 18, 2025

p4.4_recycle_bin.bin // Recovering the “Intended” Deletions

  • December 18, 2025

p4.3_cloud_remnants.log // What stays on the disk when you use OneDrive/Dropbox

  • December 18, 2025

p4.2_email_headers.forensic // Tracking the Source of a Phishing Attack

  • December 18, 2025

p3.5_usb_artifacts.sys // Removable Media Forensics

  • December 18, 2025

p4.1_browser_incognito.db // Browser Forensics: Chrome, Firefox and others

  • December 18, 2025

p3.4_lnk_jumplists.trk // LNK Files & Jump Lists

  • December 18, 2025

p5.4_final_report.pdf // Writing the Final Forensic Report

  • December 18, 2025

p5.3_anti_forensics.wipe // Identifying When a Suspect Tried to Wipe Their Tracks

  • December 18, 2025

p5.2_super_timeline.log // Creating the “Super Timeline” (log2timeline)

  • December 18, 2025

p5.1_file_carving.hex // Recovering Images and Docs by their “Magic Bytes”

  • December 18, 2025

p4.4_recycle_bin.bin // Recovering the “Intended” Deletions

  • December 18, 2025

p4.3_cloud_remnants.log // What stays on the disk when you use OneDrive/Dropbox

  • December 18, 2025

p4.2_email_headers.forensic // Tracking the Source of a Phishing Attack

  • December 18, 2025

p3.5_usb_artifacts.sys // Removable Media Forensics

  • December 18, 2025

p4.1_browser_incognito.db // Browser Forensics: Chrome, Firefox and others

  • December 18, 2025

p3.4_lnk_jumplists.trk // LNK Files & Jump Lists

Load More

Stop wasting time and money on theoretical garbage. We build labs that actually break things, taught by people who’ve actually been in the trenches. Ocsaly is about zero-day logic, forensic precision, and skills that survive a real-world engagement.

  • [email protected]

Certifications

  • OEHO | Ocsaly Ethical Hacking Operator
  • SNIA | Specialized Network Infrastructure Analyst
  • DFIR | Digital Forensics & Incd. Response
  • CVHE | Certified Vehicle Hardware Exploiter
  • AFRE | Advanced Firmware Reverse Engineer
  • All Certifications ->

> Tactics.
> Techniques.
> Procedures.

  • Digital Forensics Interactive Learning
  • Reverse Engineering Interactive Learning
  • Wireless Hacking Interactive Learning
  • Cyber Security Interactive Learning
  • All TPP Trainings ->

Legal

  • Terms & Conditions
  • Privacy Policy
  • Disclaimer

Register Lost your password?