sleuthkit / autopsy
Autopsy® is a digital forensics platform and graphical interface to The Sleuth Kit® and other digital forensics tools. It can be used by law enforcement, military, and corporate examiners to investigate what happened on a computer. You can even use it to recover photos from your camera's memory card.
☆2,593Updated last week
Alternatives and similar repositories for autopsy:
Users that are interested in autopsy are comparing it to the libraries listed below
- The Sleuth Kit® (TSK) is a library and collection of command line digital forensics tools that allow you to investigate volume and file s…☆2,758Updated this week
- Volatility 3.0 development☆2,972Updated this week
- Cuckoo Sandbox is an automated dynamic malware analysis system☆5,636Updated 2 years ago
- Super timeline all the things☆1,809Updated 3 weeks ago
- Loki - Simple IOC and YARA Scanner☆3,502Updated 4 months ago
- An advanced memory forensics framework☆7,604Updated last year
- LiME (formerly DMD) is a Loadable Kernel Module (LKM), which allows the acquisition of volatile memory from Linux and Linux-based devices…☆1,794Updated 5 months ago
- Repo to store compiled modules or links to 3rd party add-on modules.☆472Updated 4 months ago
- Repository of yara rules☆4,328Updated 11 months ago
- Web browser forensics for Google Chrome/Chromium☆1,141Updated 2 weeks ago
- Please no pull requests for this repository. Thanks!☆2,165Updated 2 weeks ago
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆1,878Updated 2 months ago
- Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run yo…☆3,657Updated 2 weeks ago
- TheHive: a Scalable, Open Source and Free Security Incident Response Platform☆3,599Updated 2 years ago
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,468Updated 2 weeks ago
- MISP (core software) - Open Source Threat Intelligence and Sharing Platform☆5,609Updated this week
- A curated list of awesome YARA rules, tools, and people.☆3,739Updated this week
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,808Updated last year
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,624Updated 4 years ago
- This is the development tree. Production downloads are at:☆1,184Updated this week
- VirusTotal Wanna Be - Now with 100% more Hipster☆1,680Updated last year
- oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware a…☆3,019Updated 2 months ago
- Digging Deeper....☆3,164Updated this week
- GRR Rapid Response: remote live forensics for incident response☆4,864Updated last month
- Modern Honey Network☆2,447Updated 3 months ago
- Noriben - Portable, Simple, Malware Analysis Sandbox☆1,143Updated last year
- The pattern matching swiss knife☆8,650Updated this week
- Open Source Vulnerability Management Platform☆5,313Updated 2 weeks ago
- Rekall Memory Forensic Framework☆1,945Updated 4 years ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,079Updated this week