An open-source digital image forensic toolset
β3,135Apr 17, 2026Updated 3 weeks ago
Alternatives and similar repositories for sherloq
Users that are interested in sherloq are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- π± Andriller - is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically sound, non-deβ¦β1,557Jun 27, 2022Updated 3 years ago
- Automated image forensics toolβ527Sep 15, 2016Updated 9 years ago
- πΈ Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell β¦β7,216Oct 31, 2023Updated 2 years ago
- π΅οΈββοΈ Offensive Google framework.β18,881Apr 10, 2026Updated last month
- Digital Forensics Investigation Platformβ886Oct 12, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available β’ AdRun AI, ML, and HPC workloads on powerful cloud GPUsβwithout limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- βοΈ A curated list of awesome forensic analysis tools and resourcesβ5,035Apr 12, 2026Updated 3 weeks ago
- MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.β12,378Updated this week
- Free hands-on digital forensics labs for students and facultyβ2,603Mar 21, 2026Updated last month
- β‘ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes β‘β21,371Updated this week
- Create fake certs for binaries using windows binaries and the power of bat filesβ574Mar 28, 2024Updated 2 years ago
- A browser extension for OSINT searchβ1,779Apr 13, 2026Updated 3 weeks ago
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.β17,658Apr 13, 2026Updated 3 weeks ago
- Awesome list of digital forensic toolsβ548Nov 16, 2020Updated 5 years ago
- Network Analysis Toolβ3,353Apr 10, 2023Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer β’ AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Collection of malware source code for a variety of platforms in an array of different programming languages.β18,183Sep 10, 2025Updated 8 months ago
- List of Github repositories and articles with list of dorks for different search enginesβ2,623Apr 11, 2025Updated last year
- API, CLI, and Web App for analyzing and finding a person's profile in 1000 social media \ websitesβ22,747Jan 12, 2026Updated 3 months ago
- Collections of tools and methods created to aid in OSINT collectionβ3,491Jun 30, 2023Updated 2 years ago
- Extract and Visualize Data from URLs using Unfurlβ738Apr 19, 2026Updated 3 weeks ago
- π΅οΈββοΈ Collect a dossier on a person by username from 3000+ sitesβ26,803Updated this week
- Imago is a python tool that extract digital evidences from images.β268Dec 23, 2021Updated 4 years ago
- Malwoverview is a first response tool for threat hunting across VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Mβ¦β3,820Apr 16, 2026Updated 3 weeks ago
- People tracker on the Internet: OSINT analysis and research tool by Jose Pinoβ8,660Jun 20, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer β’ AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- π A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.β53,409May 1, 2026Updated last week
- A collection of several hundred online tools for OSINTβ7,890Jul 16, 2025Updated 9 months ago
- Never ever ever use pixelation as a redaction techniqueβ8,304Mar 15, 2024Updated 2 years ago
- A curated list of amazingly awesome OSINTβ26,105May 2, 2026Updated last week
- An HTTP toolkit for security research.β10,173Feb 5, 2025Updated last year
- π Generate malicious PDF test files for testing phone-home callbacks, SSRF, XSS, NTLM credential theft, and data exfiltration in PDF vieβ¦β3,677Apr 20, 2026Updated 2 weeks ago
- Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database β¦β2,594Jan 4, 2024Updated 2 years ago
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password π‘οΈβ6,519Apr 12, 2026Updated 3 weeks ago
- π Share end-to-end encrypted secrets with others via a one-time URLβ1,843Feb 8, 2025Updated last year
- Virtual machines for every use case on DigitalOcean β’ AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A list of free and open forensics analysis tools and other resourcesβ2,236Apr 20, 2025Updated last year
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sockβ7,134Mar 12, 2024Updated 2 years ago
- The FLARE team's open-source tool to identify capabilities in executable files.β5,991Updated this week
- Hunt down social media accounts by username across social networksβ82,821May 2, 2026Updated last week
- Depix is a PoC for a technique to recover plaintext from pixelized screenshots.β4,527Apr 14, 2026Updated 3 weeks ago
- Stalk your Friends. Find their Instagram, FB and Twitter Profiles using Image Recognition and Reverse Image Search.β5,081Apr 25, 2024Updated 2 years ago
- Reverse Engineer's Toolkitβ5,190May 1, 2025Updated last year