BWF:
backwater forensics
Digital Forensics & Infrastructure Security Research
Professional-grade forensic analysis tools and infrastructure vulnerability research. Protecting critical systems through rigorous investigation and responsible disclosure.
The Shadows Project
Infrastructure Security Investigation
An ongoing investigation into critical infrastructure vulnerabilities affecting national telecommunications systems. This research examines structural weaknesses that may impact network security and service integrity.
Through analysis of publicly available documentation and infrastructure patterns, this investigation documents systemic security concerns and facilitates responsible disclosure to affected parties and regulatory authorities.
Goal: Identify and document infrastructure security vulnerabilities, ensure responsible disclosure, and support efforts to strengthen critical systems.
Featured Tool: Apple Forensics Dashboard
Comprehensive forensic analysis platform for iOS and macOS devices
Apple Forensics v1.0 Stable
A powerful, streamlined dashboard for conducting forensic investigations on Apple devices. Extract, analyze, and document evidence from iOS and macOS systems with professional-grade tools.
- Complete iOS & macOS artifact extraction
- SQLite database analysis and visualization
- Timeline generation and correlation
- Automated reporting and documentation
- Cross-platform compatibility (Windows, macOS, Linux)
- Evidence integrity verification
Forensic Toolkit
A comprehensive suite of digital forensics tools for modern investigations
Apple Forensics Dashboard
Complete forensic analysis suite for iOS and macOS devices with automated artifact extraction and timeline generation.
Network Analysis Tools
Deep packet inspection and network forensics utilities for investigating suspicious network activity and infrastructure conditions.
Infrastructure Mapping
Forensic analysis tools for mapping carrier network boundaries, identifying dual-plant conditions, and documenting provisioning gaps.
Timeline Generator
Create comprehensive forensic timelines from multiple data sources for incident reconstruction and pattern analysis.
Evidence Documentation
Automated report generation and evidence documentation tools for maintaining chain of custody and disclosure preparation.
Database Analyzers
Extract and analyze data from common database formats used by mobile and desktop applications, including CMTS and provisioning systems.