sleuthkit / autopsy
Autopsy® is a digital forensics platform and graphical interface to The Sleuth Kit® and other digital forensics tools. It can be used by law enforcement, military, and corporate examiners to investigate what happened on a computer. You can even use it to recover photos from your camera's memory card.
☆2,539Updated last month
Alternatives and similar repositories for autopsy:
Users that are interested in autopsy are comparing it to the libraries listed below
- The Sleuth Kit® (TSK) is a library and collection of command line digital forensics tools that allow you to investigate volume and file s…☆2,719Updated this week
- Repo to store compiled modules or links to 3rd party add-on modules.☆460Updated 3 months ago
- An advanced memory forensics framework☆7,528Updated last year
- Loki - Simple IOC and YARA Scanner☆3,467Updated 2 months ago
- The pattern matching swiss knife☆8,542Updated last week
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,090Updated 3 weeks ago
- A list of free and open forensics analysis tools and other resources☆1,181Updated 3 months ago
- ⭐️ A curated list of awesome forensic analysis tools and resources☆4,151Updated 2 weeks ago
- Please no pull requests for this repository. Thanks!☆2,130Updated last week
- Volatility 3.0 development☆2,907Updated this week
- YARA signature and IOC database for my scanners and tools☆2,554Updated last week
- oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware a…☆2,988Updated last month
- A curated list of awesome YARA rules, tools, and people.☆3,684Updated last week
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆1,854Updated last month
- Repository of yara rules☆4,287Updated 10 months ago
- Super timeline all the things☆1,784Updated last month
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,510Updated 7 months ago
- This is the development tree. Production downloads are at:☆1,162Updated last week
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆2,830Updated 8 months ago
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mand…☆7,082Updated 4 months ago
- Digging Deeper....☆3,109Updated this week
- MISP (core software) - Open Source Threat Intelligence and Sharing Platform☆5,528Updated this week
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,412Updated this week
- TheHive: a Scalable, Open Source and Free Security Incident Response Platform☆3,558Updated 2 years ago
- Powerful Python tool to analyze PDF documents☆1,335Updated 6 months ago
- Indicators of Compromises (IOC) of our various investigations☆1,728Updated this week
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based S…☆1,583Updated 4 years ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆7,282Updated last week
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆6,922Updated this week
- yarGen is a generator for YARA rules☆1,602Updated 8 months ago