Foremost is a console program to recover files based on their headers, footers, and internal data structures. This process is commonly referred to as data carving. Foremost can work on image files, such as those generated by dd, Safeback, Encase, etc, or directly on a drive. The headers and footers can be specified by a configuration file or you…
☆364May 26, 2023Updated 2 years ago
Alternatives and similar repositories for foremost
Users that are interested in foremost are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Compile foremost for windows so it can run without cygwin. Check README for instruction to compile for windows.☆20Feb 5, 2016Updated 10 years ago
- Scalpel is an open source data carving tool. It is not being actively maintained.☆680Mar 27, 2024Updated 2 years ago
- ☆726Feb 20, 2024Updated 2 years ago
- detect stegano-hidden data in PNG & BMP☆1,563Jan 28, 2026Updated 3 months ago
- ☆22Nov 27, 2013Updated 12 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Firmware Analysis Tool☆13,900Apr 14, 2026Updated 3 weeks ago
- Collection of tools related to 7z, stego, and CTFs☆14Oct 9, 2020Updated 5 years ago
- Least Significant Bit Steganography for bitmap images (.bmp and .png), WAV sound files, and byte sequences. Simple LSB Steganalysis (LSB …☆649Oct 10, 2025Updated 6 months ago
- ☆313Aug 26, 2023Updated 2 years ago
- An advanced memory forensics framework☆8,009May 16, 2025Updated 11 months ago
- UNMAINTAINED. USE AT OWN RISK. Stegdetect is an automated tool for detecting steganographic content in images.☆424Oct 31, 2018Updated 7 years ago
- AVR assembly plugin for Binary Ninja☆12Jun 6, 2018Updated 7 years ago
- ☆18Feb 13, 2014Updated 12 years ago
- A general way to Recover Safe linking protected value/pointer☆15Oct 23, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Parses Java Cache IDX files☆40Feb 28, 2018Updated 8 years ago
- cisco-torch : mass scanning, fingerprinting, and exploitation tool☆44Sep 20, 2015Updated 10 years ago
- stegsolve on MacOS☆71Nov 19, 2018Updated 7 years ago
- Pi-hole Remote Code Execution authenticated Version >= 4.3.2☆11Aug 5, 2020Updated 5 years ago
- Scripts and Modules for forensical analyses of mysql database systems☆22Sep 19, 2014Updated 11 years ago
- Yet another Stego Tool☆405Apr 10, 2026Updated 3 weeks ago
- a collection of yara rules for binary analysis☆24Aug 24, 2017Updated 8 years ago
- cisco-auditing-tool : Scans cisco routers for common vulnerabilities☆15Sep 21, 2015Updated 10 years ago
- Convert kirbi ticket from mimikatz into hashcat format to crack it☆13Mar 5, 2019Updated 7 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A braindead program for cracking encrypted ZIP archives. Forked from http://oldhome.schmorp.de/marc/fcrackzip.html☆468Mar 23, 2023Updated 3 years ago
- OpenCL Digital Forensics data analysis and file carving tool☆25May 14, 2023Updated 2 years ago
- Simple steganography program based on the LSB method.☆131Jun 2, 2023Updated 2 years ago
- [Mirror] thc.org uses a CA that is not trusted on a base Arch system so we are mirroring some source here.☆15Nov 9, 2013Updated 12 years ago
- EmPyre Web Interface☆12Mar 23, 2017Updated 9 years ago
- analyzeMFT.py is designed to fully parse the MFT file from an NTFS filesystem and present the results as accurately as possible in multip…☆532Apr 27, 2026Updated last week
- Sample code for ret2usr (and ret2dir) kernel attacks☆10Nov 23, 2016Updated 9 years ago
- dnsenum is a perl script that enumerates DNS information☆685Oct 8, 2019Updated 6 years ago
- Extracts favicon of the current page and calculates their murmurhash. Firefox extension source code.☆18Feb 20, 2024Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- python3实现与佛论禅”佛曰“和”如是我闻“两种加密字符串的解密☆30Dec 2, 2025Updated 5 months ago
- A simple code for detects Host header vulnerability☆12Feb 18, 2020Updated 6 years ago
- CTF framework and exploit development library☆13,412Updated this week
- A set of security related tools☆684Mar 8, 2021Updated 5 years ago
- An AFF4 C++ implementation.☆215Mar 24, 2023Updated 3 years ago
- PEDA - Python Exploit Development Assistance for GDB☆6,115Jul 29, 2024Updated last year
- Exploit Development and Reverse Engineering with GDB & LLDB Made Easy☆10,391Updated this week