sleuthkit / autopsy
Autopsy® is a digital forensics platform and graphical interface to The Sleuth Kit® and other digital forensics tools. It can be used by law enforcement, military, and corporate examiners to investigate what happened on a computer. You can even use it to recover photos from your camera's memory card.
☆2,627Updated this week
Alternatives and similar repositories for autopsy:
Users that are interested in autopsy are comparing it to the libraries listed below
- The Sleuth Kit® (TSK) is a library and collection of command line digital forensics tools that allow you to investigate volume and file s…☆2,781Updated this week
- An advanced memory forensics framework☆7,634Updated last year
- ⭐️ A curated list of awesome forensic analysis tools and resources☆4,258Updated last month
- Loki - Simple IOC and YARA Scanner☆3,516Updated 4 months ago
- Repo to store compiled modules or links to 3rd party add-on modules.☆485Updated 5 months ago
- Volatility 3.0 development☆3,021Updated this week
- Rekall Memory Forensic Framework☆1,947Updated 4 years ago
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,167Updated 2 months ago
- A curated list of awesome YARA rules, tools, and people.☆3,772Updated 3 weeks ago
- A list of free and open forensics analysis tools and other resources☆1,252Updated 5 months ago
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,503Updated this week
- oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware a…☆3,039Updated 3 months ago
- Repository of yara rules☆4,362Updated last year
- yarGen is a generator for YARA rules☆1,626Updated 2 weeks ago
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆7,160Updated last week
- The pattern matching swiss knife☆8,705Updated last week
- Indicators of Compromises (IOC) of our various investigations☆1,754Updated 3 weeks ago
- Malware Configuration And Payload Extraction☆2,347Updated this week
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆1,894Updated last week
- Web browser forensics for Google Chrome/Chromium☆1,156Updated last week
- Cuckoo Sandbox is an automated dynamic malware analysis system☆5,659Updated 2 years ago
- MISP (core software) - Open Source Threat Intelligence and Sharing Platform☆5,637Updated last week
- Please no pull requests for this repository. Thanks!☆2,189Updated last week
- Digital Forensics artifact repository☆1,101Updated 3 months ago
- ✨ A curated list of awesome threat detection and hunting resources 🕵️♂️☆4,116Updated 9 months ago
- Super timeline all the things☆1,825Updated last month
- Printer Exploitation Toolkit - The tool that made dumpster diving obsolete.☆4,051Updated 8 months ago
- LiME (formerly DMD) is a Loadable Kernel Module (LKM), which allows the acquisition of volatile memory from Linux and Linux-based devices…☆1,805Updated 6 months ago
- This is the development tree. Production downloads are at:☆1,196Updated 3 weeks ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,651Updated 4 years ago