Foremost is a console program to recover files based on their headers, footers, and internal data structures. This process is commonly referred to as data carving. Foremost can work on image files, such as those generated by dd, Safeback, Encase, etc, or directly on a drive. The headers and footers can be specified by a configuration file or you…
☆363May 26, 2023Updated 2 years ago
Alternatives and similar repositories for foremost
Users that are interested in foremost are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Compile foremost for windows so it can run without cygwin. Check README for instruction to compile for windows.☆20Feb 5, 2016Updated 10 years ago
- Scalpel is an open source data carving tool. It is not being actively maintained.☆677Mar 27, 2024Updated 2 years ago
- ☆726Feb 20, 2024Updated 2 years ago
- detect stegano-hidden data in PNG & BMP☆1,557Jan 28, 2026Updated 2 months ago
- Firmware Analysis Tool☆13,825Feb 5, 2026Updated 2 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Compile foremost for windows so it can run without cygwin. Check README for instruction to compile for windows.☆111Feb 5, 2016Updated 10 years ago
- Collection of tools related to 7z, stego, and CTFs☆14Oct 9, 2020Updated 5 years ago
- Least Significant Bit Steganography for bitmap images (.bmp and .png), WAV sound files, and byte sequences. Simple LSB Steganalysis (LSB …☆649Oct 10, 2025Updated 6 months ago
- ☆306Aug 26, 2023Updated 2 years ago
- An advanced memory forensics framework☆7,994May 16, 2025Updated 11 months ago
- UNMAINTAINED. USE AT OWN RISK. Stegdetect is an automated tool for detecting steganographic content in images.☆423Oct 31, 2018Updated 7 years ago
- AVR assembly plugin for Binary Ninja☆12Jun 6, 2018Updated 7 years ago
- A general way to Recover Safe linking protected value/pointer☆15Oct 23, 2022Updated 3 years ago
- cisco-torch : mass scanning, fingerprinting, and exploitation tool☆44Sep 20, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Pi-hole Remote Code Execution authenticated Version >= 4.3.2☆11Aug 5, 2020Updated 5 years ago
- Scripts and Modules for forensical analyses of mysql database systems☆22Sep 19, 2014Updated 11 years ago
- Yet another Stego Tool☆406Updated this week
- a collection of yara rules for binary analysis☆24Aug 24, 2017Updated 8 years ago
- cisco-auditing-tool : Scans cisco routers for common vulnerabilities☆15Sep 21, 2015Updated 10 years ago
- Convert kirbi ticket from mimikatz into hashcat format to crack it☆13Mar 5, 2019Updated 7 years ago
- A braindead program for cracking encrypted ZIP archives. Forked from http://oldhome.schmorp.de/marc/fcrackzip.html☆467Mar 23, 2023Updated 3 years ago
- OpenCL Digital Forensics data analysis and file carving tool☆25May 14, 2023Updated 2 years ago
- Libewf is a library to access the Expert Witness Compression Format (EWF)☆303Dec 20, 2025Updated 3 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Steganography brute-force utility to uncover hidden data inside files☆594Dec 25, 2020Updated 5 years ago
- python3实现与佛论禅”佛曰“和”如是我闻“两种加密字符串的解密☆29Dec 2, 2025Updated 4 months ago
- The best tool for finding one gadget RCE in libc.so.6☆2,315Mar 5, 2026Updated last month
- Foremost is a console program to recover files based on their headers, footers, and internal data structures. c.f., http://foremost.sourc…☆54Jan 10, 2013Updated 13 years ago
- analyzeMFT.py is designed to fully parse the MFT file from an NTFS filesystem and present the results as accurately as possible in multip…☆532Aug 13, 2025Updated 8 months ago
- A simple code for detects Host header vulnerability☆12Feb 18, 2020Updated 6 years ago
- This is the development tree. Production downloads are at:☆1,351Jan 29, 2026Updated 2 months ago
- CTF framework and exploit development library☆13,360Apr 7, 2026Updated last week
- A set of security related tools☆686Mar 8, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- An AFF4 C++ implementation.☆214Mar 24, 2023Updated 3 years ago
- PEDA - Python Exploit Development Assistance for GDB☆6,110Jul 29, 2024Updated last year
- Exploit Development and Reverse Engineering with GDB & LLDB Made Easy☆10,319Updated this week
- A docker environment for pwn in ctf☆804Updated this week
- ☆15Apr 12, 2023Updated 3 years ago
- NTFS parser, plus linking capabilites between MFT LogFile and UsnJrnl☆38Aug 23, 2016Updated 9 years ago
- Allows you to quickly query a Windows machine for RAM artifacts☆219Jul 17, 2020Updated 5 years ago