LinuxforensicsEverything related to Linux Forensics
Stars: ✭ 189 (+50%)
pyaff4The Python implementation of the AFF4 standard.
Stars: ✭ 37 (-70.63%)
Forensic ToolsA collection of tools for forensic analysis
Stars: ✭ 204 (+61.9%)
MemlabsEducational, CTF-styled labs for individuals interested in Memory Forensics
Stars: ✭ 696 (+452.38%)
INDXRipperCarve file metadata from NTFS index ($I30) attributes
Stars: ✭ 32 (-74.6%)
ForensicsToolsA list of free and open forensics analysis tools and other resources
Stars: ✭ 392 (+211.11%)
TcpflowTCP/IP packet demultiplexer. Download from:
Stars: ✭ 1,231 (+876.98%)
KauditAlcide Kubernetes Audit Log Analyzer - Alcide kAudit
Stars: ✭ 23 (-81.75%)
Icpr2020dfdcVideo Face Manipulation Detection Through Ensemble of CNNs
Stars: ✭ 64 (-49.21%)
Tr1pdtamper resistant audit log
Stars: ✭ 13 (-89.68%)
MrMobile Revelator
Stars: ✭ 69 (-45.24%)
WhatfilesLog what files are accessed by any Linux process
Stars: ✭ 800 (+534.92%)
Rifiuti2Windows Recycle Bin analyser
Stars: ✭ 100 (-20.63%)
Dfw1n OsintAustralian Open Source Intelligence Gathering Resources, Australias Largest Open Source Intelligence Repository for Cyber Professionals and Ethical Hackers
Stars: ✭ 63 (-50%)
HindsightWeb browser forensics for Google Chrome/Chromium
Stars: ✭ 589 (+367.46%)
Operative Frameworkoperative framework is a OSINT investigation framework, you can interact with multiple targets, execute multiple modules, create links with target, export rapport to PDF file, add note to target or results, interact with RESTFul API, write your own modules.
Stars: ✭ 511 (+305.56%)
TurbiniaAutomation and Scaling of Digital Forensics Tools
Stars: ✭ 461 (+265.87%)
Awesome HackingAwesome hacking is an awesome collection of hacking tools.
Stars: ✭ 1,802 (+1330.16%)
KobackupdecHuawei backup decryptor
Stars: ✭ 94 (-25.4%)
Pcapxray❄️ PcapXray - A Network Forensics Tool - To visualize a Packet Capture offline as a Network Diagram including device identification, highlight important communication and file extraction
Stars: ✭ 1,096 (+769.84%)
GosintOSINT Swiss Army Knife
Stars: ✭ 401 (+218.25%)
Infosec referenceAn Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
Stars: ✭ 4,162 (+3203.17%)
PlasoSuper timeline all the things
Stars: ✭ 1,055 (+737.3%)
Swap digger swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searches for Linux user credentials, web forms credentials, web forms emails, http basic authentication, Wifi SSID and keys, etc.
Stars: ✭ 354 (+180.95%)
Artifacts📇 Digital Forensics Artifact Repository (forensicanalysis edition)
Stars: ✭ 21 (-83.33%)
AutopsyAutopsy® is a digital forensics platform and graphical interface to The Sleuth Kit® and other digital forensics tools. It can be used by law enforcement, military, and corporate examiners to investigate what happened on a computer. You can even use it to recover photos from your camera's memory card.
Stars: ✭ 1,183 (+838.89%)
GensumPowerful checksum generator!
Stars: ✭ 12 (-90.48%)
Awesome ForensicsA curated list of awesome forensic analysis tools and resources
Stars: ✭ 1,775 (+1308.73%)
UsbripTracking history of USB events on GNU/Linux
Stars: ✭ 903 (+616.67%)
Etl ParserEvent Trace Log file parser in pure Python
Stars: ✭ 66 (-47.62%)
Docker ExplorerA tool to help forensicate offline docker acquisitions
Stars: ✭ 328 (+160.32%)
CortexCortex: a Powerful Observable Analysis and Active Response Engine
Stars: ✭ 676 (+436.51%)
MetaforgeAn OSINT Metadata analyzing tool that filters through tags and creates reports
Stars: ✭ 63 (-50%)
DiffyDiffy is a triage tool used during cloud-centric security incidents, to help digital forensics and incident response (DFIR) teams quickly identify suspicious hosts on which to focus their response.
Stars: ✭ 555 (+340.48%)
Artifacts KitPseudo-malicious usermode memory artifact generator kit designed to easily mimic the footprints left by real malware on an infected Windows OS.
Stars: ✭ 99 (-21.43%)
SeqboxA single file container/archive that can be reconstructed even after total loss of file system structures
Stars: ✭ 480 (+280.95%)
BrambleBramble is a hacking Open source suite.
Stars: ✭ 60 (-52.38%)
Awesome ForensicsAwesome Forensics Resources. Almost 300 open source forensics tools, and 600 blog posts about forensics.
Stars: ✭ 446 (+253.97%)
TimesketchCollaborative forensic timeline analysis
Stars: ✭ 1,795 (+1324.6%)
PigA Linux packet crafting tool.
Stars: ✭ 384 (+204.76%)
AutotimelinerAutomagically extract forensic timeline from volatile memory dump
Stars: ✭ 54 (-57.14%)
SiftSIFT
Stars: ✭ 355 (+181.75%)
GohacktoolsHacker tools on Go (Golang)
Stars: ✭ 1,303 (+934.13%)
ThehivedocsDocumentation of TheHive
Stars: ✭ 353 (+180.16%)
MftecmdParses $MFT from NTFS file systems
Stars: ✭ 45 (-64.29%)
Oletoolsoletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware analysis, forensics and debugging.
Stars: ✭ 1,848 (+1366.67%)
Mac aptmacOS Artifact Parsing Tool
Stars: ✭ 329 (+161.11%)
Pentesting toolkit🏴☠️ Tools for pentesting, CTFs & wargames. 🏴☠️
Stars: ✭ 1,268 (+906.35%)
Amt ForensicsRetrieve Intel AMT's Audit Log from a Linux machine without knowing the admin user's password.
Stars: ✭ 37 (-70.63%)
MalconfscanVolatility plugin for extracts configuration data of known malware
Stars: ✭ 327 (+159.52%)
Firefed🕵️ A tool for Firefox profile analysis, data extraction, forensics and hardening
Stars: ✭ 37 (-70.63%)
Ir RescueA Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.
Stars: ✭ 311 (+146.83%)
HackdroidAndroid Apps, Roms and Platforms for Pentesting
Stars: ✭ 310 (+146.03%)
BeagleBeagle is an incident response and digital forensics tool which transforms security logs and data into graphs.
Stars: ✭ 976 (+674.6%)
ProwlerProwler is a security tool to perform AWS security best practices assessments, audits, incident response, continuous monitoring, hardening and forensics readiness. It contains more than 200 controls covering CIS, ISO27001, GDPR, HIPAA, SOC2, ENS and other security frameworks.
Stars: ✭ 4,561 (+3519.84%)