A curated list of essential digital forensics tools used for investigation, data recovery, and security analysis. These tools help in disk forensics, memory analysis, network monitoring, malware analysis, and more.
☆106Jan 25, 2026Updated 3 months ago
Alternatives and similar repositories for Digital-Forensics-Tools
Users that are interested in Digital-Forensics-Tools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- One Liner OSINT is a collection of powerful one-liner commands for Open-Source Intelligence (OSINT) gathering.☆72Jan 25, 2026Updated 3 months ago
- DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficient…☆14Jan 25, 2026Updated 3 months ago
- Useful OSINT tools for Discord☆24Jan 21, 2026Updated 4 months ago
- This application contains intentional security vulnerabilities and should never be deployed in production environments or exposed to the …☆17Apr 25, 2025Updated last year
- API Pentesting Tools are specialized security tools used to test and analyze the security of Application Programming Interfaces (APIs).☆238Jan 25, 2026Updated 3 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Secure, rust-based installer back-end for Athena OS☆10May 5, 2026Updated 2 weeks ago
- HACKING BOT is an automated bug bounty tool that streamlines security testing by running multiple cybersecurity tools in parallel. It all…☆20Mar 6, 2025Updated last year
- MINOTAUR: The STRONGEST Secure Prompt EVER! Prompt Security Challenge, Impossible GPT Security, Prompts Cybersecurity, Prompting Vulnerab…☆26Mar 27, 2024Updated 2 years ago
- ScribdT - Focused on Extracting Data from Scribd☆13May 16, 2025Updated last year
- Exports Discord chat logs to a file☆12Sep 24, 2024Updated last year
- Bullet-proof your custom GPT system prompt security with KEVLAR, the ultimate prompt protector against rules extraction, prompt injection…☆20Apr 12, 2024Updated 2 years ago
- HOCig- Automatic HOC Information Gathering Tool V 1.2☆10May 4, 2021Updated 5 years ago
- ☆12Feb 19, 2026Updated 3 months ago
- Windows / Linux Local Privilege Escalation Workshop☆11Jan 15, 2019Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Lists various tools used in hardware hacking.☆34Jan 25, 2026Updated 3 months ago
- Google Dorks that can be used for penetration testing, security research, and information gathering.☆36May 8, 2026Updated last week
- Provide a GUI desktop experience for Athena OS in Windows Subsystem for Linux (WSL 2).☆14Feb 6, 2025Updated last year
- Simple script to generate commands to achieve reverse shells.☆12Aug 12, 2019Updated 6 years ago
- This tool combines the power of Ollama (Mistral) with your terminal to turn natural language into real shell commands. Whether you want t…☆26Jan 25, 2026Updated 3 months ago
- AdminPBuster identifies hidden admin panels for any domain using a built-in wordlist that includes both common and obscure paths, effecti…☆57May 1, 2025Updated last year
- Docker install for edex-ui☆20Jun 7, 2019Updated 6 years ago
- SOC bilgileri yer almaktadır.☆22Jul 2, 2025Updated 10 months ago
- Hands-on projects on Static and Dynamic malware analysis with real-world tools.☆163Jun 5, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Complete Malware Index - Use at your own Risk!☆20Sep 2, 2024Updated last year
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆13Mar 2, 2019Updated 7 years ago
- Next generation face swapper and enhancer☆21Sep 24, 2024Updated last year
- This was made with the intention of providing evidence of work done towards furthering education in cyber security.☆12May 12, 2022Updated 4 years ago
- ¿Sospechas que un archivo podría contener información oculta o maliciosa? Ésta herramienta de análisis avanzado escanea PDFs, documentos …☆22Apr 2, 2025Updated last year
- Nitko web server scanner☆15Sep 25, 2019Updated 6 years ago
- OneLinerBounty is a collection of quick, actionable bug bounty tips in one-liner format. Perfect for bug hunters looking to boost their s…☆62Jan 25, 2026Updated 3 months ago
- Okay DaVinci is an AI personal assistant fueled by Elevenlabs and ChatGPT☆30Sep 24, 2024Updated last year
- Open Sourcce Steganography☆27Feb 20, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆19Apr 28, 2025Updated last year
- Automated pentest report writing and generation using DOCX templates and markdown.☆26Apr 1, 2025Updated last year
- Notes and resources for the AD☆11Aug 2, 2022Updated 3 years ago
- RedAudit is a next-generation Windows forensic and security assessment framework featuring a live cyber-operations GUI built for real inv…☆35Nov 15, 2025Updated 6 months ago
- ☆110Feb 14, 2026Updated 3 months ago
- ☆103Aug 31, 2021Updated 4 years ago
- Privilege Escalation using Passwd - April Fools prank☆37Apr 3, 2025Updated last year