Tier 2Deep dive · 30–60 min · 40 methods
Advanced PC Checking
Beyond surface artifacts. Tier 2 introduces NTFS-level reconstruction of file lifecycles, multi-source execution correlation, automated event-log threat hunting, and unified timeline analysis in Timeline Explorer. Each technique strengthens the case by stacking independent evidence sources.
T2
Tier 2 Tool Downloads
3T2
Deep File System Analysis
8T2
Deep Execution Correlation
4T2
Timeline & Event Analysis
3T2
User Activity Deep Dive
6T2
Process & Memory
4T2
Persistence & Evasion
5T2
External Devices
2T2
Java & Scripts
2T2
Hash & Binary Triage
2T2
Full Timeline Reconstruction
1The Golden Rule — Tier 2
The timeline doesn't lie. Every action leaves traces in multiple places. Cross-reference EVERYTHING. If it happened, the evidence is there — you just have to find it.