sleuthkit / autopsy
Autopsy® is a digital forensics platform and graphical interface to The Sleuth Kit® and other digital forensics tools. It can be used by law enforcement, military, and corporate examiners to investigate what happened on a computer. You can even use it to recover photos from your camera's memory card.
☆2,430Updated 2 months ago
Related projects ⓘ
Alternatives and complementary repositories for autopsy
- The Sleuth Kit® (TSK) is a library and collection of command line digital forensics tools that allow you to investigate volume and file s…☆2,633Updated this week
- Loki - Simple IOC and YARA Scanner☆3,404Updated 3 weeks ago
- Repository of yara rules☆4,181Updated 7 months ago
- An advanced memory forensics framework☆7,359Updated last year
- This is the development tree. Production downloads are at:☆1,116Updated 6 months ago
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,270Updated this week
- ⭐️ A curated list of awesome forensic analysis tools and resources☆3,999Updated last week
- YARA signature and IOC database for my scanners and tools☆2,486Updated this week
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆1,806Updated this week
- The pattern matching swiss knife☆8,311Updated last month
- Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run yo…☆3,490Updated 2 weeks ago
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆2,738Updated 5 months ago
- A curated list of awesome YARA rules, tools, and people.☆3,565Updated this week
- Volatility 3.0 development☆2,710Updated this week
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆2,969Updated last week
- Repo to store compiled modules or links to 3rd party add-on modules.☆446Updated last week
- A list of free and open forensics analysis tools and other resources☆1,081Updated last year
- Digging Deeper....☆2,984Updated this week
- Super timeline all the things☆1,734Updated last month
- Empire is a PowerShell and Python post-exploitation agent.☆7,461Updated 4 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,525Updated 4 years ago
- LiME (formerly DMD) is a Loadable Kernel Module (LKM), which allows the acquisition of volatile memory from Linux and Linux-based devices…☆1,726Updated last month
- Scalpel is an open source data carving tool. It is not being actively maintained.☆627Updated 7 months ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆5,565Updated 2 years ago
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆6,601Updated 2 weeks ago
- oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware a…☆2,924Updated 4 months ago
- A swiss army knife for pentesting networks☆8,461Updated 11 months ago
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.☆5,167Updated last month
- A curated list of tools for incident response☆7,681Updated 4 months ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,471Updated last year