Awesome-Forensics
Awesome Forensics Tools
https://github.com/iamramahibrah/Awesome-Forensics
Last synced: 11 days ago
JSON representation
-
Related Awesome Lists
-
Tools
-
Carving
- photorec - File carving tool
- floss - Static analysis tool to automatically deobfuscate strings from malware binaries
- bulk_extractor - Extracts information such as email addresses, creditcard numbers and histrograms from disk images
- bstrings - Improved strings utility
- swap_digger - A bash script used to automate Linux swap analysis, automating swap extraction and searches for Linux user credentials, Web form credentials, Web form emails, etc.
-
Network Forensics
- WireShark - A network protocol analyzer
- NetworkMiner - Network Forensic Analysis Tool
- Kismet - A passive wireless sniffer
-
Distributions
- Remnux - Distro for reverse-engineering and analyzing malicious software
- Tsurugi Linux - Linux distribution for forensic analysis
- WinFE - Windows Forensics enviroment
- bitscout - LiveCD/LiveUSB for remote forensic acquisition and analysis
- SANS Investigative Forensics Toolkit (sift) - Linux distribution for forensic analysis
-
Acquisition
- Belkasoft RAM Capturer - Volatile Memory Acquisition Tool
- CrowdResponse - A static host data collection tool by CrowdStrike
- DFIR ORC - Forensics artefact collection tool for systems running Microsoft Windows
- WinTriage - Wintriage is a live response tool that extracts Windows artifacts. It must be executed with local or domain administrator privileges and recommended to be done from an external drive.
- Magnet RAM Capture - A free imaging tool designed to capture the physical memory
- Velociraptor - Velociraptor is a tool for collecting host based state information using Velocidex Query Language (VQL) queries
- AVML - A portable volatile memory acquisition tool for Linux
- LiME - Loadable Kernel Module (LKM), which allows the acquisition of volatile memory from Linux and Linux-based devices, formerly called DMD
- FastIR Collector - Collect artifacts on windows
- artifactcollector - A customizable agent to collect forensic artifacts on any Windows, macOS or Linux system
- ArtifactExtractor - Extract common Windows artifacts from source images and VSCs
- unix_collector - A live forensic collection script for UNIX-like systems as a single script.
-
IOC Scanner
- THOR Lite - Free IOC and YARA Scanner
- Fastfinder - Fast customisable cross-platform suspicious file finder. Supports md5/sha1/sha256 hashes, literal/wildcard strings, regular expressions and YARA rules
- Loki - Simple IOC and Incident Response Scanner
- Fenrir - Simple Bash IOC Scanner
-
Frameworks
- Autopsy - SleuthKit GUI
- Kuiper - Digital Investigation Platform
- Laika BOSS - Laika is an object scanner and intrusion detection system
- IntelMQ - IntelMQ collects and processes security feeds
- The Sleuth Kit - Tools for low level forensic analysis
- turbinia - Turbinia is an open-source framework for deploying, managing, and running forensic workloads on cloud platforms
- PowerForensics - PowerForensics is a framework for live disk forensic analysis
- dff - Forensic framework
- dexter - Dexter is a forensics acquisition framework designed to be extensible and secure
- IPED - Indexador e Processador de Evidências Digitais - Brazilian Federal Police Tool for Forensic Investigations
- hashlookup-forensic-analyser - A tool to analyse files from a forensic acquisition to find known/unknown hashes from [hashlookup](https://www.circl.lu/services/hashlookup/) API or using a local Bloom filter.
- Wombat Forensics - Forensic GUI tool
- Autopsy - SleuthKit GUI
-
Windows Artifacts
- FRED - Cross-platform microsoft registry hive editor
- LastActivityView - LastActivityView by Nirsoftis a tool for Windows operating system that collects information from various sources on a running system, and displays a log of actions made by the user and events occurred on this computer.
- MFT-Parsers - Comparison of MFT-Parsers
- MFTEcmd - MFT Parser by Eric Zimmerman
- Beagle - Transform data sources and logs into graphs
- LogonTracer - Investigate malicious Windows logon by visualizing and analyzing Windows event log
- RegRippy - A framework for reading and extracting useful forensics data from Windows registry hives
- python-evt - Pure Python parser for classic Windows Event Log files (.evt)
- RegRipper3.0 - RegRipper is an open source Perl tool for parsing the Registry and presenting it for analysis
- MFTExtractor - MFT-Parser
- NTFS USN Journal parser
- RecuperaBit - Reconstruct and recover NTFS data
- python-ntfs - NTFS analysis
- MFT-Parsers - Comparison of MFT-Parsers
- NTFS journal parser
-
Mobile Forensics
- ArtEx - Artifact Examiner for iOS Full File System extractions
- MobSF - An automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.
- Andriller - A software utility with a collection of forensic tools for smartphones
- ALEAPP - An Android Logs Events and Protobuf Parser
- iOS Frequent Locations Dumper - Dump the contents of the StateModel#.archive files located in /private/var/mobile/Library/Caches/com.apple.routined/
- MEAT - Perform different kinds of acquisitions on iOS devices
- OpenBackupExtractor - An app for extracting data from iPhone and iPad backups.
- iLEAPP - An iOS Logs, Events, And Plists Parser
-
Internet Artifacts
- ChromeCacheView - A small utility that reads the cache folder of Google Chrome Web browser, and displays the list of all files currently stored in the cache
- unfurl - Extract and visualize data from URLs
- hindsight - Internet history forensics for Google Chrome/Chromium
- chrome-url-dumper - Dump all local stored infromation collected by Chrome
-
Timeline Analysis
- Timeline Explorer - Timeline Analysis tool for CSV and Excel files. Built for SANS FOR508 students
- timesketch - Collaborative forensic timeline analysis
- DFTimewolf - Framework for orchestrating forensic collection, processing and data export using GRR and Rekall
- plaso - Extract timestamps from various files and aggregate them
- timeliner - A rewrite of mactime, a bodyfile reader
-
Disk image handling
- xmount - Convert between different disk image formats
- libewf - Libewf is a library and some tools to access the Expert Witness Compression Format (EWF, E01)
- Disk Arbitrator - A Mac OS X forensic utility designed to help the user ensure correct forensic procedures are followed during imaging of a disk device
- imagemounter - Command line utility and Python package to ease the (un)mounting of forensic disk images
- PancakeViewer - Disk image viewer based in dfvfs, similar to the FTK Imager viewer
-
Decryption
- hashcat - Fast password cracker with GPU support
- John the Ripper - Password cracker
-
Picture Analysis
-
Metadata Forensics
-
Imaging
- Guymager - Open source version for disk imageing on linux systems
- dc3dd - Improved version of dd
- FTK Imager - Free imageing tool for windows
-
Live Forensics
- osquery - SQL powered operating system analytics
- mig - Distributed & real time digital forensics at the speed of the cloud
- grr - GRR Rapid Response: remote live forensics for incident response
- Linux Expl0rer - Easy-to-use live forensics toolbox for Linux endpoints written in Python & Flask
- UAC - UAC (Unix-like Artifacts Collector) is a Live Response collection script for Incident Response that makes use of native binaries and tools to automate the collection of AIX, Android, ESXi, FreeBSD, Linux, macOS, NetBSD, NetScaler, OpenBSD and Solaris systems artifacts.
- POFR - The Penguin OS Flight Recorder collects, stores and organizes for further analysis process execution, file access and network/socket endpoint data from the Linux Operating System.
-
Docker Forensics
- Docker Explorer
- dof (Docker Forensics Toolkit) - Extracts and interprets forensic artifacts from disk images of Docker Host systems
-
OS X Forensics
- OSXAuditor
- mac_apt (macOS Artifact Parsing Tool) - Extracts forensic artifacts from disk images or live machines
- APFS Fuse - A read-only FUSE driver for the new Apple File System
- MacLocationsScraper - Dump the contents of the location database files on iOS and macOS
- macMRUParser - Python script to parse the Most Recently Used (MRU) plist files on macOS into a more human friendly format
- OSX Collect
-
Memory Forensics
- volatility - The memory forensic framework
- inVtero.net - High speed memory analysis framework
- Rekall - Memory Forensic Framework
- MemProcFS - An easy and convenient way of accessing physical memory as files a virtual file system.
- KeeFarce - Extract KeePass passwords from memory
- VolUtility - Web App for Volatility framework
-
Steganography
-
Management
-
-
Resources
-
Twitter
- @iamevltwin - Mac Nerd, Forensic Analyst, Author & Instructor of SANS FOR518
- @4n6ist
- @aheadless
- @AppleExaminer - Apple OS X & iOS Digital Forensics
- @carrier4n6 - Brian Carrier, author of Autopsy and the Sleuth Kit
- @CindyMurph - Detective & Digital Forensic Examiner
- @forensikblog - Computer forensic geek
- @HECFBlog - SANS Certified Instructor
- @Hexacorn - DFIR+Malware
- @hiddenillusion
- @jaredcatkinson - PowerShell Forensics
- @maridegrazia - Computer Forensics Examiner
- @sleuthkit
- @williballenthin
- @XWaysGuide
- @inginformatico - DFIR analyst and enthusiast
- @Belkasoft
- @blackbagtech
- @iamevltwin - Mac Nerd, Forensic Analyst, Author & Instructor of SANS FOR518
- @jaredcatkinson - PowerShell Forensics
- @inginformatico - DFIR analyst and enthusiast
- @Belkasoft
-
Blogs
-
Books
- The Art of Memory Forensics - Detecting Malware and Threats in Windows, Linux, and Mac Memory
- The Practice of Network Security Monitoring - Understanding Incident Detection and Response
- Recommended Readings
- Network Forensics: Tracking Hackers through Cyberspace - Learn to recognize hackers’ tracks and uncover network-based evidence
-
Web
-
File System Corpora
- Digital Forensic Challenge Images - Two DFIR challenges with images
- Digital Forensics Tool Testing Images
- Hacking Case (4.5 GB NTFS Image)
- The CFReDS Project
-
Other
- /r/computerforensics/ - Subreddit for computer forensics
- ForensicPosters - Posters of file system structures
- SANS Posters - Free posters provided by SANS
-
Labs
- BlueTeam.Lab - Blue Team detection lab created with Terraform and Ansible in Azure.
-
-
Learn Forensics
-
Steganography
- Forensic challenges - Mindmap of forensic challenges
- OpenLearn - Digital forensic course
-
CTFs and Challenges
-
-
Collections
- DFIR.Training - Database of forensic resources focused on events, tools and more
- ForensicArtifacts.com Artifact Repository - Machine-readable knowledge base of forensic artifacts
- AboutDFIR – The Definitive Compendium Project - Collection of forensic resources for learning and research. Offers lists of certifications, books, blogs, challenges and more
Sub Categories
Twitter
22
Windows Artifacts
15
Frameworks
13
Labs
13
Acquisition
12
Mobile Forensics
8
CTFs and Challenges
8
Live Forensics
6
OS X Forensics
6
Memory Forensics
6
Carving
5
Timeline Analysis
5
Distributions
5
Disk image handling
5
Blogs
5
Steganography
5
File System Corpora
4
Books
4
IOC Scanner
4
Internet Artifacts
4
Imaging
3
Web
3
Other
3
Network Forensics
3
Docker Forensics
2
Picture Analysis
2
Metadata Forensics
2
Management
2
Decryption
2
Keywords
dfir
24
forensics
19
security
15
incident-response
12
awesome
9
digital-forensics
9
awesome-list
7
python
5
linux
5
cybersecurity
4
malware-analysis
4
list
4
memory-forensics
3
ioc
3
threat-hunting
3
forensic-analysis
3
blueteam
3
malware
3
timeline
2
windows
2
lab
2
yara
2
forensics-investigations
2
intrusion-detection
2
incident-response-tooling
2
ntfs
2
yara-rules
2
solaris
2
hacking
2
android
2
ctf
2
owasp
2
computer-forensics
2
freebsd
2
dfir-automation
2
live-response
2
dynamic-analysis
2
incident-management
2
macos
2
malware-research
2
gui
2
static-analysis
2
openbsd
2
script
2
ios
2
shell
2
rest
1
runtime-security
1
yara-manager
1
web-security
1