Scalpel is an open source data carving tool. It is not being actively maintained.
☆673Mar 27, 2024Updated last year
Alternatives and similar repositories for scalpel
Users that are interested in scalpel are comparing it to the libraries listed below
Sorting:
- The Sleuth Kit® (TSK) is a library and collection of command line digital forensics tools that allow you to investigate volume and file s…☆2,993Feb 18, 2026Updated last week
- Autopsy® is a digital forensics platform and graphical interface to The Sleuth Kit® and other digital forensics tools. It can be used by …☆3,026Oct 25, 2025Updated 4 months ago
- Scalpel; File Carving. Configuration files are modified.☆122Mar 25, 2013Updated 12 years ago
- This is a prototype system that uses Hadoop to process hard drive images.☆52Oct 1, 2012Updated 13 years ago
- This is the development tree. Production downloads are at:☆1,334Jan 29, 2026Updated last month
- EVTXtract recovers and reconstructs fragments of EVTX log files from raw binary data, including unallocated space and memory images.☆208Mar 12, 2025Updated 11 months ago
- Foremost is a console program to recover files based on their headers, footers, and internal data structures. This process is commonly re…☆359May 26, 2023Updated 2 years ago
- An advanced memory forensics framework☆7,972May 16, 2025Updated 9 months ago
- Copy of the libewf source code that is configured for a 64-bit MS Visual Studio build.☆17Aug 17, 2020Updated 5 years ago
- Super timeline all the things☆2,017Feb 10, 2026Updated 2 weeks ago
- Modular file scanning/analysis framework☆622Oct 8, 2019Updated 6 years ago
- LiME (formerly DMD) is a Loadable Kernel Module (LKM), which allows the acquisition of volatile memory from Linux and Linux-based devices…☆1,936Nov 9, 2025Updated 3 months ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆14Dec 29, 2025Updated 2 months ago
- Rekall Memory Forensic Framework☆1,997Oct 18, 2020Updated 5 years ago
- PowerForensics provides an all in one platform for live disk forensic analysis☆1,428Nov 16, 2023Updated 2 years ago
- Repo to store compiled modules or links to 3rd party add-on modules.☆550Nov 8, 2024Updated last year
- Differential Analysis of Malware in Memory☆216Apr 16, 2017Updated 8 years ago
- A modern Python-3-based alternative to RegRipper☆205Mar 31, 2025Updated 11 months ago
- Firmware Analysis Tool☆13,621Feb 5, 2026Updated 3 weeks ago
- Libewf is a library to access the Expert Witness Compression Format (EWF)☆298Dec 20, 2025Updated 2 months ago
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,897Feb 23, 2026Updated last week
- Automated malware unpacker☆121Mar 5, 2016Updated 9 years ago
- OS Fingerprint Obfuscation for modern Linux Kernels☆76May 21, 2024Updated last year
- Noriben - Portable, Simple, Malware Analysis Sandbox☆1,231Aug 7, 2025Updated 6 months ago
- ReviveIT (revit) is a proof of concept file recovery tool (carver)☆13Dec 3, 2020Updated 5 years ago
- Simple web app for displaying cowrie data in your browser☆12Jun 2, 2016Updated 9 years ago
- X-Ways C# X-Tension API☆15May 28, 2013Updated 12 years ago
- SIFT☆534Feb 14, 2024Updated 2 years ago
- Builds json representation of PDF malware sample☆53Apr 11, 2011Updated 14 years ago
- Protocol Analysis/Decoder Framework☆497Dec 19, 2022Updated 3 years ago
- PEframe is a open source tool to perform static analysis on Portable Executable malware and malicious MS Office documents.☆619Aug 8, 2022Updated 3 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆827Nov 3, 2017Updated 8 years ago
- Lite version of PDF X-RAY that uses no backend☆38Nov 11, 2011Updated 14 years ago
- Yara is awesome, but sometimes you need to manipulate the data streams you're scanning in different ways.☆98Oct 21, 2014Updated 11 years ago
- Loki - Simple IOC and YARA Scanner☆3,726Jan 12, 2026Updated last month
- Automatically exported from code.google.com/p/jsunpack-n☆168Apr 2, 2015Updated 10 years ago
- ThreatTracker is a Python script designed to monitor and generate alerts on given sets of indicators of compromise (IOCs) indexed by a se…☆70Mar 9, 2015Updated 10 years ago
- Digital Forensic Investigative Scripts☆87Feb 6, 2026Updated 3 weeks ago
- A modular Python application to pull intelligence about malicious files☆123Dec 4, 2020Updated 5 years ago