Tools |
Description |
Binwalk |
It is a tool for searching a given binary image for embedded files and executable code. |
bulk-extractor |
It extracts information without parsing file systems such as e-mail addresses, credit card numbers, URLs, and other types of details from digital evidence files. |
Capstone |
It is a framework used for binary analysis and reversing. It supports multiple hardware architectures and provides semantics of the disassembled instruction. |
chntpw |
It is used to view information and change user passwords in Windows NT/2000 user database file. |
Cuckoo |
It is a malware analysis system that can provide you the details of suspicious files you asking for. |
dc3dd |
It is a patched version of GNU dd with added features for computer forensics. |
ddrescue |
It duplicates data from one file or block device to another specified file or block. |
DFF |
DFF stands for Digital Forensic Framework. It is used to quickly and easily collect, preserve, and reveal digital evidence without compromising systems and data. |
diStorm3 |
It is a lightweight, easy-to-use, and fast decomposer library that disassembles a staged reverse shell generated by msfpayload. |
Dumpzilla |
Dumpzilla is a tool to extract all forensic related information of Firefox, Iceweasel, and Seamonkey browsers to analyse. |
extundelete |
This tool is used to recover deleted files from ext3/ext4 file system partition. |
Foremost |
It is a forensic tool to recover lost files based on their headers, footers, and internal data structures. |
Galleta |
It is a forensic tool that examines the content of cookies produced by Internet explorer. |
Guymager |
It is a free forensic imager for media access. It generates flat, EWF, and AFF images support disk cloning. |
iPhone Backup Analyzer |
It is a backup utility designed to browse easily through the backup folder of an iPhone. |
p0f |
It is a traffic fingerprinting mechanism to identify the process behind any incidental TCP/IP communications without disturbing the process in any way. |
Pdf-parser |
It is used to parse a PDF document to identify the fundamental elements used in the analysed file. |
pdfid |
It scans a file to look for certain pdf keywords, allowing you to identify PDF documents that contain JavaScript. |
pdgmail |
It extracts Gmail artefacts from a pd process memory dump |
peepdf |
It is a pdf analysis tool to explore PDF files in order to find if the file can be harmful or not. |
RegRipper |
It extracts information from the windows registry and presents it for analysis. |
Volatility |
It is a memory forensic analysis platform to extracts the digital artefacts from the RAM samples. |
Xplico |
It is a network forensic analysis tool that extracts application data from internet traffic. |