Incident Response Kit
            Below is the current setup of my digital forensics and incident response kit.
            Hardware & Devices
            
                - Lenovo ThinkPad E16 Gen 2 – AMD Ryzen 7 7735HS, 64GB DDR5 RAM, 1TB PCIe SSD
- Lenovo ThinkPad t420s – 8GB DDR4 RAM, usb flash storages
- 3 USB Flash Drives – For forensic imaging and bootable OS (Kali Linux, Paladin 32, TailsOS)
- 4K Digital Camera (48MP) – For documenting evidence and work environments
- 2x Sabrent SATA to USB Cable – For connecting drives during imaging
- Lenovo Dock – Expands connectivity for workstations
- Portable Power Bank – Backup power for field work
- USB-A, USB-C, SATA, Ethernet Cables – Various data and power connections
- External Drives – Secure evidence and image storage
- Bluetooth Keyboard & Mouse
- Iphone 11 - Spare phone
- Raspberry-pi 4b 4gb RAM Forensic Duplicator - open source write blocker & imager
- Alfa AWUS036ACHM 802.11ac WiFi Range USB Adapter
Tools & Equipment
            
                - Anti-Static Wrist Straps (x2) – Prevents electrostatic damage when handling hardware
- Caring Nitrile Exam Gloves (100ct) – For contamination-free device handling
- Stypos Tactical Messenger Bag – Field kit bag for laptop, tools, and accessories
- Digital Camera Case – Protection for camera and SD cards
- Labeling Supplies – Sticky notes, permanent markers, and cable tags
- Small Screwdriver Kit – for opening laptops, desktops
Software & Utilities
            
                - FTK Imager – Reliable tool for forensic imaging
- Autopsy / Sleuth Kit – Deep forensic analysis suite
- Hash Tools – Hashcat, John the Ripper for password recovery and validation
- Network Monitoring Tools – Wireshark, TCPdump for traffic inspection
- Virtualization – VirtualBox or VMware for isolated environments
- Documentation Tools – Notepad++, Excel, Word for reporting and notes
- PALADIN LTS - Linux Distro used for Digital Forensic