sleuthkit / autopsy
Autopsy® is a digital forensics platform and graphical interface to The Sleuth Kit® and other digital forensics tools. It can be used by law enforcement, military, and corporate examiners to investigate what happened on a computer. You can even use it to recover photos from your camera's memory card.
☆2,652Updated 3 weeks ago
Alternatives and similar repositories for autopsy
Users that are interested in autopsy are comparing it to the libraries listed below
Sorting:
- The Sleuth Kit® (TSK) is a library and collection of command line digital forensics tools that allow you to investigate volume and file s…☆2,792Updated last week
- Volatility 3.0 development☆3,078Updated this week
- An advanced memory forensics framework☆7,671Updated last year
- Super timeline all the things☆1,836Updated 2 months ago
- Please no pull requests for this repository. Thanks!☆2,205Updated 2 weeks ago
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,523Updated last week
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆1,904Updated last month
- Loki - Simple IOC and YARA Scanner☆3,527Updated 5 months ago
- Repo to store compiled modules or links to 3rd party add-on modules.☆492Updated 6 months ago
- A curated list of awesome YARA rules, tools, and people.☆3,798Updated last month
- LiME (formerly DMD) is a Loadable Kernel Module (LKM), which allows the acquisition of volatile memory from Linux and Linux-based devices…☆1,810Updated 6 months ago
- The pattern matching swiss knife☆8,746Updated last week
- ⭐️ A curated list of awesome forensic analysis tools and resources☆4,289Updated 3 weeks ago
- This is the development tree. Production downloads are at:☆1,204Updated last month
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆5,799Updated last month
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,825Updated last year
- Repository of yara rules☆4,388Updated last year
- A list of free and open forensics analysis tools and other resources☆1,295Updated 3 weeks ago
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆2,884Updated 10 months ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,603Updated 5 years ago
- oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware a…☆3,056Updated 2 weeks ago
- Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run yo…☆3,692Updated 2 weeks ago
- MISP (core software) - Open Source Threat Intelligence and Sharing Platform☆5,679Updated this week
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆7,535Updated 2 weeks ago
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,188Updated 3 months ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆5,680Updated 3 years ago
- Rekall Memory Forensic Framework☆1,948Updated 4 years ago
- GRR Rapid Response: remote live forensics for incident response☆4,891Updated 3 weeks ago
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆7,218Updated last week
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,509Updated 10 months ago