Why deaddisk exists
Dead disks tell stories. This site turns those stories into reproducible methods, lean tools, and guidance you can actually run—at 3 a.m., when only truth and recovery matter. I publish as deaddisk to keep the focus on methodology, not identity. Day-to-day I work across DFIR, security engineering, tool-building, and pentesting—practical, defensible work you can copy, adapt, and trust.
Who this is for: defenders, incident responders, security engineers, and hands-on pentesters who prefer evidence over vibes.
The problem we’re here to fix#
Too much security content is:
- High-level and unhelpful under pressure,
- Tool-first without an evidence model, or
- Vendor-shaped instead of reality-shaped.
Responders and engineers need repeatable workflows and small, sharp tools that turn telemetry into decisions—with proofs you can show to leadership or a courtroom.
deaddisk exists to close that gap.
What we’re bringing to the table#
1) Engineering-grade DFIR workflows#
Step-by-step playbooks you can hand to an operator or defend later:
- Required artifacts (specific WEVTX channels, registry hives, file metadata),
- Acquisition pitfalls,
- Verification steps and negative controls,
- Chain-of-custody and reporting checklists.
Examples: blast-radius mapping, decryptor safety testing, Windows timelines from WEVTX + registry + filesystem metadata, “last known good” service/driver reconstruction.
2) Open, auditable tooling#
Utilities in Rust and PowerShell that:
- Parse Windows Event Logs/Sysmon and normalize artifacts,
- Generate timelines and cross-link evidence deterministically,
- Wrap proven tools with safer defaults and traceable output.
Design ethos: fast, predictable, minimal dependencies, and easy to review.
3) Security engineering patterns#
Reference architectures and patterns for:
- Building repeatable log pipelines and storage/retention that actually serve DFIR,
- Making checks “fail safe” (idempotent scripts, checksums, clear exit codes),
- Turning procedures into CI-style tests where possible.
4) Pentest-informed reality checks#
Pentest techniques used to pressure-test assumptions and validate detections and controls—bridging the gap between how systems break and how we detect/fix them.
5) Reproducibility over rhetoric#
Posts ship with precise inputs, copy-runnable commands, expected outputs (with hashes where it matters), and explicit limits. If a method breaks on a Windows build or retention scenario, we call it out.
Our goals#
- Shorten time-to-truth in ransomware and intrusion response.
- Raise the floor with free, defensible SOPs any competent team can adopt.
- Shrink toolchains to reduce fragility under pressure.
- Engineer for reliability: tests, fixtures, and deterministic outputs.
- Teach by showing: evidence, not vibes.
How we’re different#
- Artifact-centered writing. Claims are tied to concrete evidence and verification steps.
- Vendor-agnostic paths. If a platform is mentioned, an OSS route is shown.
- Ops-tested. Everything must pass the Tuesday-at-3-a.m. test.
- Transparent limits. Edge cases, false-positive risks, and costs are documented.
- Privacy first. Real cases are generalized and sanitized.
What to expect here#
- DFIR deep dives: Windows internals, Windows Event Logs, registry, services/drivers, VSS, AD artifacts.
- Tool posts (Rust & PowerShell): annotated source, usage guides, and benchmarks.
- Security engineering notes: pipeline patterns, storage/retention tuning, automation guardrails.
- Pentest write-ups (defender-oriented): technique breakdowns with practical mitigations.
- Reference cards: “just the facts” for common tasks (e.g., Prove process execution without 4688, Infer ransomware start time from
$STANDARD_INFORMATIONdrift).
Roadmap (near-term)#
- Windows Timeline, Fast: From raw WEVTX + registry to a defensible sequence in minutes.
- Decryptor Safety Harness: Snapshots, canaries, and side-effects testing before touching production data.
- Rust for DFIR: Robust parsers/CLIs with testable modules and reproducible binaries.
- PowerShell with Guardrails: Wrapping popular forensics tools with safer defaults and logging.
- Pentest-to-DFIR Bridges: Taking a common attack path and mapping the exact artifacts and fixes.
Principles#
- Reproducibility > rhetoric
- Defensibility > novelty
- Simplicity > cleverness
- Transparency > perfection
When we’re wrong, we’ll publish a correction and why.
On anonymity#
This site avoids personal identifiers by design. The aim is to help defenders—not to build a personality brand. If something here risks exposure, say so and it’ll be fixed quickly.
Call to action#
- Run the playbooks in a lab and measure your time-to-truth.
- Use the fixtures to test your pipeline before incidents.
- File issues or PRs when steps are ambiguous or brittle.
- Share your constraints—we’ll bake them into revisions.
Welcome to deaddisk. Less drama, more signal.