Please enable JavaScript.
Coggle requires JavaScript to display documents.
Crypto Investigation & Forensics (Rohas Nagpal) - Coggle Diagram
Crypto
Investigation
& Forensics
(Rohas Nagpal)
Crimes &
Threat
Vectors
Access Control Scams
Cryptojacking
Darknet Markets
Double Spending
Dusting Attacks
Exit Scams
Fake Exchanges
Fake Wallets
Flash Loan Attacks
Front Running
ICO Scams
Identity Theft
Insider Trading
Key Theft and Loss
Liquidity Pool Manipulation
Malware
Market Manipulation
Money Laundering
NFT Related Crime
Oracle Issue
Phishing
Ponzi Schemes
Pump and Dump Schemes
Pyramid Schemes
Ransomware
Reentrancy
Rug-pulls
SIM Swapping
Smart Contract Vulnerabilities
Stolen Funds
Sybil Attacks
Tax Evasion
Terrorism Financing
Wash Trading
Yield Farming Exploits
51% Attacks
Hi-risk
Cryptos
Binance Coin
Bitcoin
Bitcoin Cash
Dash
Dogecoin
Ether
Litecoin
Monero
Shiba Inu
Tether
Tron
XRP
Zcash
Wallets
Mobile Wallets
Multisig Wallets
Online (Web) Wallets
Desktop Wallets
Custodial Wallets
Non-Custodial Wallets
Cold Storage Wallets
Services
Automated Liquidity Protocols
Blockchain-as-a-Service
Consortium Blockchains
Custodial Services
DAOs
DeFi Platforms
Exchanges (CEX & DEX)
Faucets
Full Node Operators
Fund Raising e.g., ICO, IEO, IDO
KYC/AML Service Providers
Liquidity Providers
Masternode Operators
Miners & Mining Pools
Mixers
NFT Marketplaces
Oracles
Payment Gateways
Staking Pools
Tokenization Services
Wallet Service Providers
Practical
Investigation
Account / Balance
Address Clustering
Addresses
Best Practices
Blockchain Analytics
Blockchain Explorers
Blockchain Interoperability
Centralized Exchanges
Chain Analysis Tools
Cloud Forensics
Consensus Mechanisms
Crypto ATMs Analysis
Crypto Ecosystem
Crypto Transactions
Decentralized Exchanges
Decryption & Password breaking
Digital Identity Verification
Digital Signatures
Disk Forensics
Forensic Accounting Techniques
Forks
Hardware Wallet Forensics
Hashing
Heuristic Analysis
Layer 2 Solutions
Memory Forensics
Merkle Trees
Mixers and Tumblers Analysis
Mobile Device Forensics
Network Forensics
Peer-to-Peer Networks
Public Blockchains
Search & Seizure
Smart Contract Forensics
Smart Contracts
Social Media Analysis
Token Traceability
TOR & Dark Web
Transaction Pattern Analysis
Transactions
UTXO
Virtual Machine Forensics
Wallet Analysis
Zero-Knowledge Proofs