All Projects → redaelli → Imago Forensics

redaelli / Imago Forensics

Licence: mit
Imago is a python tool that extract digital evidences from images.

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to Imago Forensics

Invoke Liveresponse
Invoke-LiveResponse
Stars: ✭ 115 (-34.29%)
Mutual labels:  dfir, incident-response
Thehive4py
Python API Client for TheHive
Stars: ✭ 143 (-18.29%)
Mutual labels:  dfir, incident-response
Cyberchef Recipes
A list of cyber-chef recipes and curated links
Stars: ✭ 619 (+253.71%)
Mutual labels:  dfir, incident-response
Thehivedocs
Documentation of TheHive
Stars: ✭ 353 (+101.71%)
Mutual labels:  dfir, incident-response
Scripting
PS / Bash / Python / Other scripts For FUN!
Stars: ✭ 47 (-73.14%)
Mutual labels:  dfir, incident-response
Awesome Incident Response
A curated list of tools for incident response
Stars: ✭ 4,753 (+2616%)
Mutual labels:  dfir, incident-response
My Arsenal Of Aws Security Tools
List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.
Stars: ✭ 6,464 (+3593.71%)
Mutual labels:  dfir, incident-response
rhq
Recon Hunt Queries
Stars: ✭ 66 (-62.29%)
Mutual labels:  incident-response, dfir
Historicprocesstree
An Incident Response tool that visualizes historic process execution evidence (based on Event ID 4688 - Process Creation Event) in a tree view.
Stars: ✭ 46 (-73.71%)
Mutual labels:  dfir, incident-response
Beagle
Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.
Stars: ✭ 976 (+457.71%)
Mutual labels:  dfir, incident-response
Ir Rescue
A Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.
Stars: ✭ 311 (+77.71%)
Mutual labels:  dfir, incident-response
Oriana
Oriana is a threat hunting tool that leverages a subset of Windows events to build relationships, calculate totals and run analytics. The results are presented in a Web layer to help defenders identify outliers and suspicious behavior on corporate environments.
Stars: ✭ 152 (-13.14%)
Mutual labels:  dfir, incident-response
Kuiper
Digital Forensics Investigation Platform
Stars: ✭ 257 (+46.86%)
Mutual labels:  dfir, incident-response
Thehive
TheHive: a Scalable, Open Source and Free Security Incident Response Platform
Stars: ✭ 2,300 (+1214.29%)
Mutual labels:  dfir, incident-response
Threatpinchlookup
Documentation and Sharing Repository for ThreatPinch Lookup Chrome & Firefox Extension
Stars: ✭ 257 (+46.86%)
Mutual labels:  dfir, incident-response
Cortex
Cortex: a Powerful Observable Analysis and Active Response Engine
Stars: ✭ 676 (+286.29%)
Mutual labels:  dfir, incident-response
ir scripts
incident response scripts
Stars: ✭ 17 (-90.29%)
Mutual labels:  incident-response, dfir
fastfinder
Incident Response - Fast suspicious file finder
Stars: ✭ 116 (-33.71%)
Mutual labels:  incident-response, dfir
Cortex4py
Python API Client for Cortex
Stars: ✭ 22 (-87.43%)
Mutual labels:  dfir, incident-response
Threathunt
ThreatHunt is a PowerShell repository that allows you to train your threat hunting skills.
Stars: ✭ 92 (-47.43%)
Mutual labels:  dfir, incident-response

forthebadge forthebadge

Build Status Requirements Status GitHub license

imago-forensics 🕵️

Imago is a python tool that extract digital evidences from images recursively. This tool is useful throughout a digital forensic investigation. If you need to extract digital evidences and you have a lot of images, through this tool you will be able to compare them easily. Imago allows to extract the evidences into a CSV file or in a sqlite database. If in a JPEG exif are present GPS coordinates, Imago can extract the longitude and latitude and it can convert them to degrees and to retrieve relevant information like city, nation, zip code... Imago offers also the possibility to calculate Error Level Analysis, and to detect nudity these functionalities are in BETA.

Setup

Setup via pip

  1. Install imago:
$ pip install imago
  1. Once installed, one new binary should be available: :
$ imago 

And then it should output the imago's banner

Requirements:

python 2.7
exifread >= 2.1.2
python-magic >= 0.4.15
argparse >= 1.4.0
pillow >= 5.2.0
nudepy >= 0.4
imagehash >= 4.0
geopy >= 1.16.0

Usage

usage: imago.py [-h] -i INPUT [-x] [-g] [-e] [-n] [-d {md5,sha256,sha512,all}]
                [-p {ahash,phash,dhash,whash,all}] [-o OUTPUT] [-s]
                [-t {jpeg,tiff}]

optional arguments:
  -h, --help            show this help message and exit
  -i INPUT, --input INPUT
                        Input directory path
  -x, --exif            Extract exif metadata
  -g, --gps             Extract, parse and convert to coordinates, GPS exif
                        metadata from images (if any)It works only with JPEG.
  -e, --ela             Extract, Error Level Analysis image,It works only with
                        JPEG. *BETA*
  -n, --nude            Detect Nudity, It works only with JPEG, *BETA*
  -d {md5,sha256,sha512,all}, --digest {md5,sha256,sha512,all}
                        Calculate perceptual image hashing
  -p {ahash,phash,dhash,whash,all}, --percentualhash {ahash,phash,dhash,whash,all}
                        Calculate hash digest
  -o OUTPUT, --output OUTPUT
                        Output directory path
  -s, --sqli            Keep SQLite file after the computation
  -t {jpeg,tiff}, --type {jpeg,tiff}
                        Select the image, this flag can be JPEG or TIFF, if
                        this argument it is not provided, imago will process
                        all the image types(i.e. JPEG, TIFF)



The only required argument is -i which is the base directory from which imago will start to search for image file. You should also provide at least one type of extraction (i.e. exif, data, gps, digest).

Example:

$ imago -i /home/solvent/cases/c23/DCIM/ -o /home/solvent/cases/c23/ -x -s -t jpeg -d all

Where:

  • -i path: is the base directory, where imago will search for file
  • -o path: the output directory where imago will save the CSV file, with the extracted metadata
  • -x : imago will extract EXIF metadata.
  • -s: the temporary SQLite database will not be deleted after the processing.
  • -t jpeg: imago will search only for jpeg images.
  • -d all: imago will calculate md5, sha256, sha512 for the jpeg images.

Features:

Functionality Status
Recursive directory navigation ✔️
file mtime (UTC) ✔️
file ctime (UTC) ✔️
file atime (UTC) ✔️
file size (bytes) ✔️
MIME type ✔️
Exif support ✔️
CSV export ✔️
Sqlite export ✔️
md5, sha256, sha512 ✔️
Error Level Analysis ✔️ BETA
Full GPS support ✔️
Nudity detection ✔️ BETA
Perceptual Image Hashing ✔️
aHash ✔️
pHash ✔️
dHash ✔️
wHash ✔️

ToDo:

Task Status
Test code
Comments and Suggestions are welcome 👍

📑 Copyright and Licenses

Code copyright 2018 Redaelli. Code released under the MIT license.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].