ForensicsToolsA list of free and open forensics analysis tools and other resources
Stars: ✭ 392 (+1681.82%)
dcflddEnhanced version of dd for forensics and security
Stars: ✭ 27 (+22.73%)
Judge-Jury-and-ExecutableA file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQLite or CSV. Threats and data can be probed harnessing the power and syntax of SQL.
Stars: ✭ 66 (+200%)
ingest-fileIngestors extract the contents of mixed unstructured documents into structured (followthemoney) data.
Stars: ✭ 40 (+81.82%)
btrfscueRecover files from damaged BTRFS filesystems
Stars: ✭ 28 (+27.27%)
hashlookup-forensic-analyserAnalyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https://circl.lu/services/hashlookup/
Stars: ✭ 43 (+95.45%)
vminspectTools for inspecting disk images
Stars: ✭ 25 (+13.64%)
PackratLive system forensic collector
Stars: ✭ 16 (-27.27%)
pyaff4The Python implementation of the AFF4 standard.
Stars: ✭ 37 (+68.18%)
lsrootkitRootkit Detector for UNIX
Stars: ✭ 53 (+140.91%)
C Aff4An AFF4 C++ implementation.
Stars: ✭ 126 (+472.73%)
TimesketchCollaborative forensic timeline analysis
Stars: ✭ 1,795 (+8059.09%)
bobBob is a free signal-processing and machine learning toolbox originally developed by the Biometrics group at Idiap Research Institute, in Switzerland. - Mirrored from https://gitlab.idiap.ch/bob/bob
Stars: ✭ 38 (+72.73%)
Invtero.netinVtero.net: A high speed (Gbps) Forensics, Memory integrity & assurance. Includes offensive & defensive memory capabilities. Find/Extract processes, hypervisors (including nested) in memory dumps using microarchitechture independent Virtual Machiene Introspection techniques
Stars: ✭ 237 (+977.27%)
Oletoolsoletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware analysis, forensics and debugging.
Stars: ✭ 1,848 (+8300%)
UserlineQuery and report user logons relations from MS Windows Security Events
Stars: ✭ 221 (+904.55%)
Rifiuti2Windows Recycle Bin analyser
Stars: ✭ 100 (+354.55%)
GohacktoolsHacker tools on Go (Golang)
Stars: ✭ 1,303 (+5822.73%)
Pentesting toolkit🏴☠️ Tools for pentesting, CTFs & wargames. 🏴☠️
Stars: ✭ 1,268 (+5663.64%)
Forensic ToolsA collection of tools for forensic analysis
Stars: ✭ 204 (+827.27%)
SiemSIEM Tactics, Techiques, and Procedures
Stars: ✭ 157 (+613.64%)
prowlerProwler is an Open Source Security tool for AWS, Azure and GCP to perform Cloud Security best practices assessments, audits, incident response, compliance, continuous monitoring, hardening and forensics readiness. It contains hundreds of controls covering CIS, PCI-DSS, ISO27001, GDPR, HIPAA, FFIEC, SOC2, AWS FTR, ENS and custom security frameworks.
Stars: ✭ 8,046 (+36472.73%)
SleuthkitThe Sleuth Kit® (TSK) is a library and collection of command line digital forensics tools that allow you to investigate volume and file system data. The library can be incorporated into larger digital forensics tools and the command line tools can be directly used to find evidence.
Stars: ✭ 1,948 (+8754.55%)
MbaMalware Behavior Analyzer
Stars: ✭ 125 (+468.18%)
AdtimelineTimeline of Active Directory changes with replication metadata
Stars: ✭ 252 (+1045.45%)
Hibr2binComae Hibernation File Decompressor
Stars: ✭ 116 (+427.27%)
Awesome HackingAwesome hacking is an awesome collection of hacking tools.
Stars: ✭ 1,802 (+8090.91%)
Radare2UNIX-like reverse engineering framework and command-line toolset
Stars: ✭ 15,412 (+69954.55%)
Information Security TasksThis repository is created only for infosec professionals whom work day to day basis to equip ourself with uptodate skillset, We can daily contribute daily one hour for day to day tasks and work on problem statements daily, Please contribute by providing problem statements and solutions
Stars: ✭ 108 (+390.91%)
PersonalAnalyticsPersonal Analytics project to increase knowledge workers' awareness about work and productivity.
Stars: ✭ 47 (+113.64%)
Artifacts KitPseudo-malicious usermode memory artifact generator kit designed to easily mimic the footprints left by real malware on an infected Windows OS.
Stars: ✭ 99 (+350%)
flare-wmiNo description or website provided.
Stars: ✭ 399 (+1713.64%)
AutopsyAutopsy® is a digital forensics platform and graphical interface to The Sleuth Kit® and other digital forensics tools. It can be used by law enforcement, military, and corporate examiners to investigate what happened on a computer. You can even use it to recover photos from your camera's memory card.
Stars: ✭ 1,183 (+5277.27%)
TcpflowTCP/IP packet demultiplexer. Download from:
Stars: ✭ 1,231 (+5495.45%)
FatcatFAT filesystems explore, extract, repair, and forensic tool
Stars: ✭ 201 (+813.64%)
DFIR Resources REvil KaseyaResources for DFIR Professionals Responding to the REvil Ransomware Kaseya Supply Chain Attack
Stars: ✭ 172 (+681.82%)
MrMobile Revelator
Stars: ✭ 69 (+213.64%)
WhatsdumpExtract WhatsApp private key from any non-rooted Android device (Android 7+ supported)
Stars: ✭ 198 (+800%)
Etl ParserEvent Trace Log file parser in pure Python
Stars: ✭ 66 (+200%)
Icpr2020dfdcVideo Face Manipulation Detection Through Ensemble of CNNs
Stars: ✭ 64 (+190.91%)
PypowershellxrayPython script to decode common encoded PowerShell scripts
Stars: ✭ 192 (+772.73%)
MetaforgeAn OSINT Metadata analyzing tool that filters through tags and creates reports
Stars: ✭ 63 (+186.36%)
Dfw1n OsintAustralian Open Source Intelligence Gathering Resources, Australias Largest Open Source Intelligence Repository for Cyber Professionals and Ethical Hackers
Stars: ✭ 63 (+186.36%)
Ctf ToolsUseful CTF Tools
Stars: ✭ 190 (+763.64%)
BrambleBramble is a hacking Open source suite.
Stars: ✭ 60 (+172.73%)
Pcapxray❄️ PcapXray - A Network Forensics Tool - To visualize a Packet Capture offline as a Network Diagram including device identification, highlight important communication and file extraction
Stars: ✭ 1,096 (+4881.82%)
LinuxforensicsEverything related to Linux Forensics
Stars: ✭ 189 (+759.09%)
AutotimelinerAutomagically extract forensic timeline from volatile memory dump
Stars: ✭ 54 (+145.45%)
PlasoSuper timeline all the things
Stars: ✭ 1,055 (+4695.45%)
CCXDiggerThe CyberCX Digger project is designed to help Australian organisations determine if they have been impacted by certain high profile cyber security incidents. Digger provides threat hunting functionality packaged in a simple-to-use tool, allowing users to detect certain attacker activities; all for free.
Stars: ✭ 45 (+104.55%)