Foremost is a console program to recover files based on their headers, footers, and internal data structures. This process is commonly referred to as data carving. Foremost can work on image files, such as those generated by dd, Safeback, Encase, etc, or directly on a drive. The headers and footers can be specified by a configuration file or you…
☆359May 26, 2023Updated 2 years ago
Alternatives and similar repositories for foremost
Users that are interested in foremost are comparing it to the libraries listed below
Sorting:
- Compile foremost for windows so it can run without cygwin. Check README for instruction to compile for windows.☆20Feb 5, 2016Updated 10 years ago
- ☆710Feb 20, 2024Updated 2 years ago
- Scalpel is an open source data carving tool. It is not being actively maintained.☆673Mar 27, 2024Updated last year
- detect stegano-hidden data in PNG & BMP☆1,539Jan 28, 2026Updated last month
- Firmware Analysis Tool☆13,621Feb 5, 2026Updated last month
- Pure Go rewrite of knockknock☆11Feb 7, 2023Updated 3 years ago
- Collection of tools related to 7z, stego, and CTFs☆14Oct 9, 2020Updated 5 years ago
- A general way to Recover Safe linking protected value/pointer☆15Oct 23, 2022Updated 3 years ago
- ☆22Nov 27, 2013Updated 12 years ago
- An advanced memory forensics framework☆7,972May 16, 2025Updated 9 months ago
- UNMAINTAINED. USE AT OWN RISK. Stegdetect is an automated tool for detecting steganographic content in images.☆422Oct 31, 2018Updated 7 years ago
- cisco-torch : mass scanning, fingerprinting, and exploitation tool☆44Sep 20, 2015Updated 10 years ago
- Simple steganography program based on the LSB method.☆127Jun 2, 2023Updated 2 years ago
- EmPyre Web Interface☆12Mar 23, 2017Updated 8 years ago
- Least Significant Bit Steganography for bitmap images (.bmp and .png), WAV sound files, and byte sequences. Simple LSB Steganalysis (LSB …☆646Oct 10, 2025Updated 4 months ago
- ☆299Aug 26, 2023Updated 2 years ago
- cisco-auditing-tool : Scans cisco routers for common vulnerabilities☆15Sep 21, 2015Updated 10 years ago
- Libewf is a library to access the Expert Witness Compression Format (EWF)☆299Dec 20, 2025Updated 2 months ago
- t50 : Multi-protocol packet injector tool☆25Sep 20, 2015Updated 10 years ago
- mixed packet injector tool☆20Dec 29, 2020Updated 5 years ago
- Parses Java Cache IDX files☆40Feb 28, 2018Updated 8 years ago
- stegsolve on MacOS☆70Nov 19, 2018Updated 7 years ago
- dnsenum is a perl script that enumerates DNS information☆677Oct 8, 2019Updated 6 years ago
- The Sleuth Kit® (TSK) is a library and collection of command line digital forensics tools that allow you to investigate volume and file s…☆2,998Updated this week
- The best tool for finding one gadget RCE in libc.so.6☆2,301Feb 26, 2026Updated last week
- Yet another Stego Tool☆401Jul 3, 2023Updated 2 years ago
- OpenCL Digital Forensics data analysis and file carving tool☆24May 14, 2023Updated 2 years ago
- Allows you to quickly query a Windows machine for RAM artifacts☆218Jul 17, 2020Updated 5 years ago
- Encrypt, decrypt, and break caesar's cipher.☆10Jun 18, 2021Updated 4 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Exploit Development and Reverse Engineering with GDB & LLDB Made Easy☆10,156Updated this week
- CTF framework and exploit development library☆13,293Updated this week
- The ContactDB project was initiated to cover the need for a tool to maintain contacts for CSIRT teams☆37Jan 21, 2022Updated 4 years ago
- PEDA - Python Exploit Development Assistance for GDB☆6,107Jul 29, 2024Updated last year
- A docker environment for pwn in ctf☆803Sep 15, 2025Updated 5 months ago
- ☆22Apr 17, 2017Updated 8 years ago
- An app that helps you and your team find meeting times.☆19Feb 24, 2026Updated last week
- 備用的萌典(moedict pwa & app, Quasar used)☆11Jul 31, 2025Updated 7 months ago
- Volatility 3 plugins to extract a module as complete as possible☆12Jun 13, 2023Updated 2 years ago