evtkit
A PowerShell-based incident response and live forensic data acquisition tool for Windows hosts.
Digital forensics for incident response. Uncover digital evidence to understand and resolve security breaches effectively.
A PowerShell-based incident response and live forensic data acquisition tool for Windows hosts.
A tool for restoring defocused and blurred images with various deconvolution techniques and fast processing capabilities.
A user-friendly and fast Forensic Analysis tool with features like tagging files and generating preview reports.
Toolkit for post-mortem analysis of Docker runtime environments using forensic HDD copies.
A library to access and parse Windows XML Event Log (EVTX) format, useful for digital forensics and incident response.
A community-sourced repository of digital forensic artifacts in YAML format.
DMG2IMG is a tool for converting Apple compressed dmg archives to standard image disk files with support for zlib, bzip2, and LZFSE compression.
Magnet ACQUIRE offers robust data extraction capabilities for digital forensics investigations, supporting a wide range of devices.
Comprehensive digital forensics and incident response platform for law enforcement, corporate, and academic institutions.
A Python-based engine for automatic creation of timelines in digital forensic analysis
Web interface for the Volatility Memory Analysis framework with advanced features.
A library to access the Extensible Storage Engine (ESE) Database File (EDB) format used in various Windows applications.
A command line utility for managing volume shadow copies with capabilities for evasion, persistence, and file extraction.
An anti-forensic kill-switch tool for USB ports to shut down the computer immediately in case of unauthorized access.
A Python 2.x tool for memory analysis on Mac OS X systems with support for various OS versions and memory image export capabilities.
A digital forensics tool that provides read-only access to file-system objects from various storage media types and file formats.
A forensic tool to find hidden processes and TCP/UDP ports by rootkits or other hidden techniques.
A digital forensic tool for creating forensic images of computer hard drives and analyzing digital evidence.