Forensics Projects
Looking for freelance Forensics jobs and project work? PeoplePerHour has you covered.
opportunity
Porting Velociraptor to Odroid N2+ platform
Description We are seeking a software developer (not website designers) to compile the ARM64 code, which is based on Go, from GitHub. The goal is to ensure the Velociraptor server operates on the Odroid N2+ platform (4GB RAM), by creating an installer or Debian package (.deb) that functions flawlessly on Debian Ubuntu 20.04 (MATE Desktop). For more details on the platform, visit: https://wiki.odroid.com/odroid-n2/os_images/ubuntu. The project involves adapting the Velociraptor software, an open-source security tool https://docs.velociraptor.app/, to work seamlessly on the Odroid N2+ platform, a powerful ARM-based single-board computer. The primary goal is to ensure that Velociraptor runs efficiently on Odroid N2+, leveraging the device's capabilities for security monitoring and digital forensics operations. Objectives: 1. Assess the compatibility of Velociraptor with the Odroid N2+ hardware and ARM architecture. 2. Modify the Velociraptor source code for optimal performance on the Odroid N2+. 3. Ensure all Velociraptor functionalities are operational on the new platform. 4. Conduct thorough testing to ensure stability and performance. 5. Create documentation (a walk through) for installing, configuring, and using Velociraptor on Odroid N2+ showing how it was done and how to use the installer (ie any prerequisites or tips to get Velociraptor working) Deliverables: 1. Modified Velociraptor source code compatible with Odroid N2+. 2. A detailed report on code changes and adaptations made for the ARM architecture. 3. Comprehensive testing reports, including performance benchmarks and stability assessments. 4. User-friendly installation and configuration guide for Velociraptor on Odroid N2+. 5. Final project report summarizing the project's outcomes and providing recommendations for future enhancements. Skills Required: 1. Proficiency in Go programming language. 2. Experience with ARM architecture, specifically with Odroid devices. 3. Understanding of cybersecurity concepts and tools. 4. Ability to perform software testing and debugging. 5. Strong documentation and communication skills. Timeline: Week 1-2: Initial assessment and planning. Week 3-4: Code modification and adaptation. Week 5-6: Internal testing and bug fixing. Week 7: External beta testing and final adjustments. Week 8: Documentation and project wrap up.
23 days ago9 proposalsRemote
Past "Forensics" Projects
Website cloning
I seek a skilled web developer who can expertly clone an existing website containing over one thousand individual pages. The original site was built using the popular page builder Elementor, so the ideal candidate must have extensive experience working with this platform. They should be adept at analyzing the underlying code and templates in order to precisely replicate all design elements, content, and functionality found across the original site. Attention to detail is crucial, as even minor discrepancies could lead to inconsistencies or broken features. In addition to cloning the website framework and content, the developer should also be prepared to carefully style each page according to the branding and visual identity set forth in the original. Site navigation, internal links, images, and other media files all need to mirror the live website. Testing and quality assurance will be paramount to ensure a seamless user experience identical to the original site. The finished cloned site code must be clean, organized and fully compliant with current web standards and accessibility guidelines. The ideal freelancer will have extensive experience cloning existing websites through forensic analysis and reconstruction. A solid portfolio demonstrating previous successful website cloning projects using Elementor is preferred. The ability to work collaboratively, ask clarifying questions, and deliver progress updates will also be valuable. Interested developers should have availability to focus fully on this comprehensive cloning project over the next several weeks. Attention to detail and a commitment to precision will be crucial for success.
opportunity
Porting Velociraptor to Odroid N2
Project Description: This project involves adapting the Velociraptor, an open-source security tool, to work seamlessly on the Odroid N2 platform, a powerful ARM-based single-board computer. The primary goal is to ensure that Velociraptor runs efficiently on Odroid N2, leveraging the device's capabilities for security monitoring and digital forensics operations. Objectives: Assess the compatibility of Velociraptor with the Odroid N2 hardware and ARM architecture. Modify the Velociraptor source code for optimal performance on the Odroid N2. Ensure all Velociraptor functionalities are operational on the new platform. Conduct thorough testing to ensure stability and performance. Create documentation for installing, configuring, and using Velociraptor on Odroid N2. Deliverables: Modified Velociraptor source code compatible with Odroid N2. A detailed report on code changes and adaptations made for the ARM architecture. Comprehensive testing reports, including performance benchmarks and stability assessments. User-friendly installation and configuration guide for Velociraptor on Odroid N2. Final project report summarizing the project's outcomes and providing recommendations for future enhancements. Skills Required: Proficiency in Go programming language. Experience with ARM architecture, specifically with Odroid devices. Understanding of cybersecurity concepts and tools. Ability to perform software testing and debugging. Strong documentation and communication skills. Timeline: Week 1-2: Initial assessment and planning. Week 3-4: Code modification and adaptation. Week 5-6: Internal testing and bug fixing. Week 7: External beta testing and final adjustments. Week 8: Documentation and project wrap-up.
Advisor on Forensic Science Policy
I am seeking an advisor on forensic science policy who can provide guidance specifically in the area of laboratory protocols. The ideal candidate should have expertise in forensic science and a deep understanding of laboratory protocols. Key Requirements: - Strong knowledge of forensic science and laboratory protocols - Experience in reviewing and developing protocols in a forensic science setting - Familiarity with current regulations and best practices in forensic science Project Details: The project involves reviewing our existing laboratory protocols and making recommendations for improvement. Additionally, the advisor will be responsible for developing new protocols where necessary. The desired outcome of this project is to achieve an improvement in efficiency in our forensic science laboratory. Skills and Experience: - Proven experience in forensic science and laboratory protocol development - In-depth knowledge of forensic science regulations and best practices - Strong analytical and problem-solving skills - Excellent communication and collaboration abilities If you have a passion for forensic science and a strong background in laboratory protocols, we would love to hear from you. This is an exciting opportunity to contribute to the advancement of forensic science policy and make a difference in the field.
Professional organization interested in logo redesign
The American Society of Trace Evidence Examiners (ASTEE) is a professional organization comprised of 350+ forensic scientists specializing in the field of trace evidence. Trace evidence analysis encompasses lots of different materials (e.g., fibers, hairs, paint chips, gunshot residue, etc.), but the commonality is that they are mostly small and delicate (i.e., easily lost/destroyed) and require a microscope to be examined or analyzed. In other words, we use microscopy daily along with other chemistry techniques/instrumentation to analyze evidence in criminal cases. ASTEE was created in 2009 and while our website (www.asteetrace.org) was completely redesigned in 2020, our main logo remains the original from 15 years ago. ASTEE wants to commission an updated/refreshed logo that is simple, unique, and conveys who/what ASTEE is. Our current logo is very dated looking and very busy. In a new logo, we want to avoid cliché forensic science imagery like a magnifying glass, shoeprint, fingerprint, etc. and would love to find a design that is eye-catching to anyone but that a true trace evidence forensic scientist would be able to see and understand on a deeper level (i.e., we want to find a way to include an "inside" reference that only our community will understand/appreciate). Also, our new logo needs to blend well with the color palette/design of our website (see attached). I've included our current logo, as well as two good examples of modern logos from different entities (i.e., private trace evidence laboratories) that look very modern and incorporate a 3-D molecule design (McCrone Group) and a biaxial interference figure from looking through a microscope (Microtrace). These are just examples. Please peruse the Trace 101 page on our website (https://www.asteetrace.org/trace101) for inspiration, and we can also chat about unique trace evidence/microscopy images to inspire our new logo. We're hoping the designer with whom we work on this project will make an effort to learn about ASTEE before submitting a design and will provide us with a few concepts/options to choose from. Thank you!
Digital forensic examiner
I am looking to hire a digital forensic examiner to analyze deleted files and partitions. I am open to suggestions on which software and tools should be used for the examination. I require a medium deadline; the project needs to be completed within 1-2 weeks. My signature on exhibit A has already been determined was added with a program by a out of country forensic examiner. This document was signed in person on paper, not esign. I need someone with valid US credentials to examine the signature. Thank you
I need somebody able to conduct online PI, DD checks etc.
I am a Financial Professional who needs an assistant to perform IT forensics for deep dive due diligence on companies and individuals. An example of this is to perform IP check on email threads to show original email in the forwarded thread that it is true and not faked. Also in our industry we use Maltego and Nexus Lexus software for verification of companies and individuals and linked addresses and companies etc, hence seeking specialist assistant to perform tasks in support of our KYC and AML verifications is required.
Looking for a Senior Cloud Infrastructure and Security Engineer
We are a Web3 start-up focusing on Identity Provision and fraud detection with significant backing and partnerships in the blockchain space (more details will follow once initiated a conversation) We are seeking an experienced Cloud Infrastructure and Security Engineer with a strong background in GCP and Kubernetes to join our team and help us review our infrastructure, formalize our scaling approach and audit our security standard. The ideal candidate will be responsible for designing, deploying, and managing the firm's Identity Provider (IdP) application on the GCP platform using Kubernetes. They will work closely with our development team to ensure seamless integration and deployment of the application components, as well as maintain and optimize the infrastructure for scalability, reliability, and security. Requirements: • Ability to design and implement the GCP infrastructure, including VPC, subnets, firewalls, and other resources. • Manage application deployment and scaling in a Google Kubernetes Engine (GKE) cluster, utilizing Docker for containerization and developing optimized Kubernetes manifests and services. • Help us optimize cloud costs by selecting appropriate GCP services and scaling strategies, such as serverless offerings like Cloud Functions and App Engine. • Configure and manage multiple live production environments tailored to individual client needs. • Implement and manage CI/CD pipelines for automated deployments of application components using tools like Github Actions, Jenkins, or others. • Manage and optimize cloud deployment of AI models, integrating with existing CI/CD pipelines and using frameworks like TensorFlow Serving, MLflow or Kubeflow to ensure high availability, autoscaling, and version control • Ensure the application and infrastructure adhere to security best practices by implementing comprehensive security measures including firewalls, encryption, IAM roles, and intrusion detection. Ensure resilience against common attacks like DDoS, CSRF and more, while employing network segmentation, VPNs and monitoring for continuous threat management. • Develop and maintain a custom router capable of routing traffic optimally within the external services and the Kubernetes cluster. • Optionally, we would like help to leverage infrastructure-as-code tools such as Terraform or Ansible for automated and scalable cloud resource provisioning, as well as using Helm for Kubernetes application management. Requirements: • 4+ years of experience in cloud deployment, specifically using Kubernetes and GCP services. • Strong knowledge of Kubernetes and containerization technologies (Docker). • Proficient in implementing CI/CD pipelines, with demonstrated expertise in using Github Actions for streamlined and automated deployments. • Expertise in infrastructure-as-code tools like Terraform or Ansible for automated provisioning, as well as experience with Helm for Kubernetes application management. • Experience in deploying and scaling AI models in a cloud environment, familiar with model versioning and resilience frameworks like TensorFlow Serving, MLflow, or Kubeflow. • In-depth knowledge of network and cloud security. • Strong expertise in TCP/IP and UDP network protocols, complemented by practical experience in network debugging and forensics using tools like Wireshark and tcpdump. Prior experience in crafting network flow extractors, specialized routers, and packet analyzers is a plus. • Strong problem-solving skills and the ability to work well in a team-oriented environment. • Excellent communication skills, both written and verbal Please reach out to me directly, we will follow-up with a first call and depending on alignment with the role, a second meeting with the team. Thanks in advance, Massimo
opportunity
Research on forsenic toxicology
1. The length of the paper shall be between five (5) pages MINIMUM and MAXIMUM (plus or minus a paragraph) not including required title page, abstract and reference page. 2. Use a minimum of ten (5) peer reviewed sources in the generation of the work. 3. The format of the paper will follow APA guidelines and include properly formatted in-text citations and end of work references. The final product shall be in Microsoft Word format, double-spaced, using Arial or Times New Roman 12-point font, and in APA format Explain how alcohol is absorbed into the bloodstream, transported throughout the body, and eliminated by oxidation and excretion 13.2 Describe the process by which alcohol is excreted in the breath via the lungs 13.3 Discuss the methods used to determine alcohol intoxication 13.4 Discuss the process involved in the analysis of blood for alcohol 13.5 Explain how the “implied consent” law recommended by the NHTSA addressed the constitutional issues raised against blood-alcohol laws 13.6 Describe the role of the forensic toxicologist and the techniques they use to identify substances 13.7 Explain how to coordinate the drug recognition expert program with a forensic toxicology result
Wordpress Technical Support Required for Hacked Website
My Wordpress website built with Elementor and incorporating WooCommerce has been hacked and the issues are beyond my fundamental understanding capabilities. The hack is creating new administrators, changing passwords and usernames and linking to necessary elements of the website so when fraudulent users are deleted, so are integral images and information. There will also be the opportunity to work with us in increasing and securing all our websites and shop too. The corrupt files need removing and additional security implemented. Please contact me for full and further information if you think you can help. An example and excerpt from he emails I am receiving from IONOS are as follows: The following measures will be necessary in order to restore security to your IONOS contract: (A) Disinfecting or deleting the malicious files 1. Open the indicated link in your browser and use the access data for your primary SFTP user for authentication. Alternatively, you may also use an FTP client (such as FileZilla) to open the file in the ./logs/forensic/ directory. 2. The log file will contain additional information about the malicious files. Please follow the instructions indicated there. 3. To make your website accessible again, change the permissions from 200 to 604 after cleaning up the files. For directories, change the permissions from 700 to 705. Your website will only be able to be displayed properly after these changes have been made. and... This is an urgent message regarding your contract with IONOS. A few minutes ago, our antivirus scanner detected that a malicious file was uploaded to your webspace. The file can be found in your webspace at the following location: ~/untitledartistfair.co.uk/wp-content/uploads/2023/04/dfxwock.zip To protect you against dangerous hacker attacks, our antivirus scanner checks every file on your webspace that is being modified or uploaded. If the scanner detects malicious code, execution of the file is disabled to prevent further attacks. To prevent calls to this file altogether, the file permissions have been reduced. Our scan will continue after this email is sent to disable additional malicious files. Upon completion of this scan, you will receive another e-mail with detailed information on how to clean up your webspace. Please be patient as this can take several hours depending on the size of your webspace. In the meantime, you can perform a few steps. 1. Do you use a Content Managment System (CMS) such as WordPress or Joomla? Then we recommend updating the CMS including any plugins or themes to the latest versions. 2. Check your computer with an updated antivirus program. In the event that your credentials were stolen by a third party, a virus is the most likely cause. Do you have any questions? Simply reply to this email and leave your reference [Ticket AB132389658] in the message.
I need a course creator
Type of Work: Remote, Part-time Job Commitment details*: ● 10 hours weekly *Subject to change. Any further updates will be emailed officially. MAIN PURPOSE OF THE JOB The Course Content Writer is responsible for developing Lateral Connect’s live training products. During the development process, a CDM should be able to familiarise themselves with the topic and is expected to conduct the necessary research and collect reliable and relevant pieces of information and synthesise them into new and original content that is easily comprehensible, accurate, and well written in English. Writers create and oversee cybersecurity content alongside the trainer, whether it’s composing reports, synthesising data, creating manuals, or editing cybersecurity policies to resonate with the target audience. They are expected to convert strategy into actionable steps or digestible copy, working with the organisation’s needs and cybersecurity goals in mind to plan and proofread technical documentation. KEY ACCOUNTABILITIES 1. Assists in collecting and organising information for user manuals, training materials, installation guides, proposals, and reports. 2. Preparing documents for compliance audits, cyber security and vulnerability assessments, and contributing to the development of the relevant compliance programs 3. Collecting data, composing reports, and writing or improving our cybersecurity policies 4. Support with creating blog posts, how-to guides, glossary articles, presentations, white papers, case studies, and other types of content on the latest cybersecurity trends, techniques, threats, and other relevant topics 5. Researching and interviewing cybersecurity experts 6. Researching end users’ needs 7. Providing suggestions on how to address the end user information gap 8. Working with relevant teams and stakeholders to gather relevant input for the company documentation 9. Develop, design, improve, and update educational content (training courses, written exercises, quizzes, correction keys, case studies, exams, training course samples) 10. Develop, improve, and update marketing content (articles, whitepapers, brochures, course descriptions) related to educational content 11. Create course content and script from scratch which is aligned with the exam objectives (end-to-end) for CiSMP, ISO27001:2022 Lead Auditor, ISO27001:2022 Lead Implementer, Data Privacy, NCSC Training and CompTIA Security+ 12. Develop training course content on various subjects associated with information technology based on ISO standards or other best practices, such as information security, cybersecurity, privacy management, cloud security, information security risk management, ethical hacking, digital transformation, computer forensics, etc. 13. Seek for ideas and opportunities to improve the educational content 14. Communicate and work closely with project manager, especially when it comes to improving the educational content 15. Work alongside the project plan and course trianer to ensure timelines are met to expectations 16. Stay up to date with the newest trends in the industry and develop an understanding of the target audience and the market to integrate into course content 17. Include risk based approach and real-life exams of data breaches relatable per module 18. Complete the required training courses from the slides use already create and make it more interactive and gamified. 19. Ensure contents are interactive and gamified and fit for purpose (i.e. not too wordy) 20. Assess the Needs of the Learners from their background and their expectations
opportunity
Wireshark PCAP Analysis - Fixed cost is for a review and quote
I have numerous PCAP files in need of forensic review These have been generated by monitoriing all network traffic to and from my Samsung Galaxy mobile. These PCAP files have been exported and can be uploaded into Wireshark without any editing. My mobile phone has been subject to remote unathorised access, as well as remote command and control attacks. I have found heavily modified XML Manifests for existing apps, which have been edited as either a part of a spyware program such as Spyzie or COCO Spy, or are a customised script providing the same functionality. A PCAP was running proceeding and during a remote access attack to my mobile, and has recorded all information showing how the incoming payload effected the ability to send outgoing messages on WhatsApp I would like an experienced professional, with a proven history of relevant, completed jobs, to review the PCAP file in order to Decrypt protected payloads Ascertain what the incoming traffic and commands would have executed Where this came from (as muich as possible) Ascertain how access would have been initially gained This information would be required in a professional report explaining the above. Please contact me with a brief outline of your relavent experience, availibility and an initial fixed price for a one hour review of the material (I will send the full PCAP and other revlevant material) Following this reivew I would like to know what time and cost is required to meet the above, what can be delivered on, and any other suggestions you may have. I have similar work which is required following sucessful delivery on this contract in other risk areas. Further consultancy time is an absolute guarantee if this can be delivered upon quickly and to a high standard Please note any applications missing a breif summary of relavent experience, candidates living outside of the UK, or unable to start within a very short space of time will unfortintey have their applications closed immediately. Differences in time between countries, and further work with 3rd parties dictate this must be a UK based candidate A sample of the PCAP file will be sent as required.
Technical chart for a forensic science professional organization
I am the President of the American Society of Trace Evidence Examiners (ASTEE, www.asteetrace.org). We are a professional organization of ~350 Forensic Scientists who specialize in the field of Trace Evidence, which focuses on using microscopes to analyze and compare different materials that are commonly encountered at crime scenes (e.g., fibers, paint, tape, glass, hairs, etc.). Our slogan is “Tout Contact Laisse une Trace”, which is French for “Every Contact Leaves a Trace” (https://en.wikipedia.org/wiki/Locard%27s_exchange_principle). There is a technical reference chart that is commonly used by people in our profession called the "Michel-Lévy Interference Color Chart" (M-L Chart). It’s used to judge various characteristics of different materials when they are viewed through a microscope. The chart is something you would find in a textbook, but over the years lots of companies have created printed copies of the M-L Chart, and most Trace Evidence examiners have a copy hanging up somewhere in their lab and/or next to their microscope. Usually, these prints are cheaply made on laminated copier paper, and branded as marketing material by companies who sell microscopes. I want to create a new Michel-Lévy Chart design that is high quality, elevated to look more like art, and branded by ASTEE! My goal is to create a bold new design that ASTEE can use to make a set of limited edition framed giclée prints on archival paper for raffles, auctions, door prizes, etc. We may also offer the design up for sale to our members at some point (e.g., prints, digital download, etc.). I want the new ASTEE design to prominently include the name of the “American Society of Trace Evidence Examiners”, the title “Michel-Lévy Interference Color Chart”, and these two images: 1. Bowen Michel-Lévy Chart.ai - One of the members of ASTEE, Andrew M. Bowen, recently wrote a new Trace Evidence textbook and created a modern, color-accurate version of the M-L chart for his book. He gave me permission to use his graphic for our printed design. -It would be great to include a tasteful credit to Mr. Bowen in the new design, but not required. I may have him sign and number the limited edition prints, which seems like a cool touch. -You can modify anything that is outside the thin white border that surrounds the color chart. The colors and graph lines within the thin white border cannot be modified because they are important for the technical accuracy of the chart. -You can modify the fonts, text sizes, and text colors as you see fit, but all the numbers and text must still be present, and the numbers must line up with the appropriate graph lines within the chart for technical accuracy. 2. ASTEE_Logo1_Color.png -The ASTEE Logo should not be modified, with the possible exception of color (see challenge coin example). Attached, you will also find: 3. ASTEE Website Color Palette.pdf -Used to redesign our website in 2020. -The burgundy color (HEX #520100) is our main color. -The font families used on our website are Inconsolata and Dosis. -If you are poking around our website for inspiration, please know that I have access to all the images we used and can provide the files upon request. Please let me know if you have any questions. I look forward to hearing from you and hope we can work together to come up with an awesome new design for ASTEE! Best regards, Daniel Mabel (he/him/his) ASTEE President
opportunity
Forensic Accountancy work required to help with business dispute
We require an individual to undertake some forensic accountancy-type work. We are in dispute with a business partner and need to evidence through the disclosure of all the records we hold that no inappropriate activities have been done. The financial transactions consist of three years worth of banking records, which are currently held in excel format and or sage format. The individual needs to be able to speak and write in English and understand how UK financial transactions work.
Senior Blockchain investigator
Job description: -Provide investigative/analytic support for extremely complex, technical, and highly sensitive investigations and initiatives pertaining to cryptocurrencies. -Prepare in-depth summaries of data from extensive research and analysis -Work with law enforcement bodies all around the world to achieve cooperation and help in solving international investigations and fraud cases. Requirements: -A degree in cybersecurity, cyber crime, intelligence, criminal justice, forensic accounting, data analytics, or a similar -Ability to obtain a Public Trust clearance -Previous work experience in federal government, intelligence analysis or law enforcement investigations, or equivalent forensic experience related to dark web, counter-terrorism, or financial crime investigations or technical analysis highly desired -Knowledge of and/or passion for blockchain/cryptocurrency technology -Experience with blockchain investigative tools -Work with high level blockchain investigation tools - A must
opportunity
ARM64 developer needed to make GUI for Forensic Software to Work
We are looking for a Linux software developer, preferably with experience in porting to ARM64 (Raspberry Pi, Odroid). Our goal is to bring together several open-source computer applications which provide the user with a range of professional tools to work with via a user-friendly GUI. The applications have been designed and built to work specifically in Linux, and an OS application can be reverse engineered to work in Linux as a start. So we already have a prototype to work with. Can you recommend yourself or another for the task?
opportunity
AGE-GROUP CLASSIFICATION ASSESSMENT TOOL
I need a developer who specialises in Artificial Intelligence, and Neural Networks and could use any of Macro-in-Excel VBA, Python or any programming language to create a simple scalable classification model. Not serious work but something that can function and perform some simple task as this is not a commercial model. A student work, even if it means just the first few basic steps of the entire model, provided it can perform some basic functions. I intend to develop an Age-Group Classification Tool (ACT) that can function optimally, so Forensic Dentists/Odontologists, with the help of the tool, can accurately classify samples of PRs according to their corresponding Dental Age Estimation (DAE) techniques based on a suite of key Dental Anatomical Parameters (DAPs). I have suggested Analytical Hierarchy Process but if you can suggest an alternative for AHP then that will also be fine. CY,
Marketing consultant for 2 hours to help with a report
I have a lot of competitor information in an easily digestible format (a review of the socials, SEM Rush reports etc) I would like it disseminated into a report that can be given with a conclusion of recommendations of what the client should be doing based on what the competitors have done. All files will be sent over. I need a marketing consultant / expert, who is based in the UK and has done this before. I am out the office for a couple of days and don't have the bandwidth to sort it. Would take me 1 hour so am allowing someone new double! It doesn't need to be forensic, just to look like some credible work.
urgent
Audio Transcript
Hi I need someone who can transcript an unclear recording of 26 minutes. Needs to be forensic and every word needs to be written. Regards
Research paper about forensic linguistics
I need a professional writer who could write a paper for me (nearly 20 pages) with at least 25 references in APA citation, about forensic linguistics (we can chose the title later on).