sleuthkit / autopsyLinks
Autopsy® is a digital forensics platform and graphical interface to The Sleuth Kit® and other digital forensics tools. It can be used by law enforcement, military, and corporate examiners to investigate what happened on a computer. You can even use it to recover photos from your camera's memory card.
☆2,889Updated last month
Alternatives and similar repositories for autopsy
Users that are interested in autopsy are comparing it to the libraries listed below
Sorting:
- The Sleuth Kit® (TSK) is a library and collection of command line digital forensics tools that allow you to investigate volume and file s…☆2,922Updated this week
- This is the development tree. Production downloads are at:☆1,287Updated 3 weeks ago
- Loki - Simple IOC and YARA Scanner☆3,685Updated last month
- MISP (core software) - Open Source Threat Intelligence and Sharing Platform☆6,019Updated this week
- Repository of yara rules☆4,588Updated last year
- A curated list of awesome YARA rules, tools, and people.☆4,082Updated 8 months ago
- A list of free and open forensics analysis tools and other resources☆1,518Updated 7 months ago
- Super timeline all the things☆1,962Updated last week
- Please no pull requests for this repository. Thanks!☆2,361Updated 2 weeks ago
- An advanced memory forensics framework☆7,888Updated 6 months ago
- Volatility 3.0 development☆3,686Updated last week
- Digging Deeper....☆3,597Updated this week
- LiME (formerly DMD) is a Loadable Kernel Module (LKM), which allows the acquisition of volatile memory from Linux and Linux-based devices…☆1,895Updated 2 weeks ago
- ⭐️ A curated list of awesome forensic analysis tools and resources☆4,683Updated this week
- Your Everyday Threat Intelligence☆1,933Updated 3 weeks ago
- TheHive: a Scalable, Open Source and Free Security Incident Response Platform☆3,859Updated 4 months ago
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,464Updated 3 weeks ago
- Repo to store compiled modules or links to 3rd party add-on modules.☆533Updated last year
- Indicators of Compromises (IOC) of our various investigations☆1,885Updated this week
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆2,036Updated 3 weeks ago
- The pattern matching swiss knife☆9,212Updated 2 weeks ago
- YARA signature and IOC database for my scanners and tools☆2,800Updated this week
- Web browser forensics for Google Chrome/Chromium☆1,329Updated last month
- oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware a…☆3,230Updated 5 months ago
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,793Updated 2 weeks ago
- yarGen is a generator for YARA rules☆1,744Updated last month
- Malware Configuration And Payload Extraction☆2,817Updated this week
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,509Updated last year
- Security Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management☆3,105Updated 4 years ago
- Scalpel is an open source data carving tool. It is not being actively maintained.☆665Updated last year