Open-Source Cybersecurity Tools: Digital Forensics & DFIR
← Back to Open-Source Cybersecurity Tools Hub | Full Open Source Catalog | Main Atlas
This category contains 145 documented tools. It focuses on capabilities used for timeline creation, disk and memory evidence analysis, and legal-quality reporting. Use this section when building shortlists, comparing operational tradeoffs, and mapping controls to detection/response ownership.
Category Evaluation Checklist
- Coverage depth against your highest-priority threats and compliance obligations.
- Operational overhead for deployment, tuning, and long-term maintenance.
- Signal quality versus analyst workload and false-positive pressure.
- Integration fit with SIEM, ticketing, identity, cloud, and engineering workflows.
- Governance readiness including auditability, ownership clarity, and change control.
Jump by Name
# | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | R | S | T | U | W | X | Z
Letter
This letter section contains 6 tools.
Autopsy
- Website: https://www.sleuthkit.org/autopsy
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Cyber Security Tools
What it does: Autopsy is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Digital forensics platform and graphical interface.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Digital Forensics.
Caine
- Website: https://www.caine-live.net
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Cyber Security Tools, Awesome Hacking
What it does: Caine is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: CAINE is a Ubuntu-based app that offers a complete forensic environment that provides a graphical interface. This tool can be integrated into existing software tools as a module. It automatically extracts a timeline from RAM.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Linux Distributions.
FTK Imager
- Website: https://accessdata.com/product-download/ftk-imager-version-4.2
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Cyber Security Tools
What it does: FTK Imager is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Forensic imaging tool.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Digital Forensics.
The Sleuth Kit (TSK)
- Website: https://www.sleuthkit.org
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Cyber Security Tools
What it does: The Sleuth Kit (TSK) is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: A library and collection of command-line tools for digital forensics.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Digital Forensics.
X1 Search
- Website: https://www.x1.com/products/x1-search
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Cyber Security Tools
What it does: X1 Search is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Forensic search and data extraction tool.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Digital Forensics.
/r/computerforensics/
- Website: https://www.reddit.com/r/computerforensics/
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: /r/computerforensics/ is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Subreddit for computer forensics.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Resources > Other.
Letter A
This letter section contains 11 tools.
A1 Website Download
- Website: http://www.microsystools.com/products/website-download
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome OSINT
What it does: A1 Website Download is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Download entire websites to disk.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Offline Browsing.
acquirepi
- Website: https://github.com/plonxyz/acquirepi
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: acquirepi is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Successor to 4n6pi, scalable forensic disk imager, designed to run on a Raspberry Pi, powered by libewf.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Imaging.
ALEAPP
- Website: https://github.com/abrignoni/ALEAPP
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: ALEAPP is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: An Android Logs Events and Protobuf Parser.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Mobile Forensics.
ALEX
- Website: https://github.com/prosch88/ALEX
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: ALEX is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Extract files from ADB devices on Windows, Linux and MacOS. Mostly a wrapper for adbutils.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Acquisition.
Andriller
- Website: https://github.com/den4uk/andriller
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: Andriller is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: A software utility with a collection of forensic tools for smartphones.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Mobile Forensics.
APFS Fuse
- Website: https://github.com/sgan81/apfs-fuse
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: APFS Fuse is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: A read-only FUSE driver for the new Apple File System.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > OS X Forensics.
ArtEx
- Website: https://www.doubleblak.com/index.php
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: ArtEx is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Artifact Examiner for iOS Full File System extractions.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Mobile Forensics.
ArtifactExtractor
- Website: https://github.com/Silv3rHorn/ArtifactExtractor
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: ArtifactExtractor is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Extract common Windows artifacts from source images and VSCs.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Acquisition.
Audacity
- Website: http://sourceforge.net/projects/audacity/
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome CTF
What it does: Audacity is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Analyze sound files (mp3, m4a, whatever).
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Solve > Forensics.
Autopsy
- Website: http://www.sleuthkit.org/autopsy/
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Hacking, Awesome Forensics
What it does: Autopsy is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: A digital forensics platform and graphical interface to and other digital forensics tools.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Frameworks.
Awesome Anti Forensics
- Website: https://github.com/remiflavien1/awesome-anti-forensic
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Security
What it does: Awesome Anti Forensics is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: A collection of awesome tools used to counter forensics activities.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Security > Other Awesome Lists > Other Security Awesome Lists.
Letter B
This letter section contains 6 tools.
Beagle
- Website: https://github.com/yampelo/beagle
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: Beagle is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Transform data sources and logs into graphs.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Windows Artifacts.
BelkaCTF
- Website: https://belkasoft.com/ctf
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: BelkaCTF is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: CTFs by Belkasoft.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Learn Forensics > CTFs and Challenges.
Belkasoft RAM Capturer
- Website: https://belkasoft.com/ram-capturer
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: Belkasoft RAM Capturer is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Volatile Memory Acquisition Tool.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Acquisition.
Bkhive and Samdump2
- Website: http://sourceforge.net/projects/ophcrack/files/samdump2/
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome CTF
What it does: Bkhive and Samdump2 is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Dump SYSTEM and SAM files.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Solve > Forensics.
Blauhaunt
- Website: https://github.com/cgosec/Blauhaunt
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: Blauhaunt is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: A tool collection for filtering and visualizing logon events.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Windows Artifacts.
bstrings
- Website: https://github.com/EricZimmerman/bstrings
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: bstrings is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Improved strings utility.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Carving.
Letter C
This letter section contains 8 tools.
CFF Explorer
- Website: http://www.ntcore.com/exsuite.php
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome CTF
What it does: CFF Explorer is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: PE Editor.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Solve > Forensics.
chrome-url-dumper
- Website: https://github.com/eLoopWoo/chrome-url-dumper
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: chrome-url-dumper is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Dump all local stored infromation collected by Chrome.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Internet Artifacts.
ChromeCacheView
- Website: https://www.nirsoft.net/utils/chrome_cache_view.html
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: ChromeCacheView is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: A small utility that reads the cache folder of Google Chrome Web browser, and displays the list of all files currently stored in the cache.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Internet Artifacts.
CobaltStrikeScan
- Website: https://github.com/Apr4h/CobaltStrikeScan
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Cybersecurity Blue Team
What it does: CobaltStrikeScan is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Scan files or process memory for Cobalt Strike beacons and parse their configuration.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Cybersecurity Blue Team > Windows-based defenses.
Computer Aided Investigative Environment (CAINE)
- Website: https://caine-live.net/
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Cybersecurity Blue Team
What it does: Computer Aided Investigative Environment (CAINE) is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Italian GNU/Linux live distribution that pre-packages numerous digital forensics and evidence collection tools.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Cybersecurity Blue Team > Operating System distributions.
Creddump
- Website: https://github.com/moyix/creddump
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome CTF
What it does: Creddump is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Dump windows credentials.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Solve > Forensics.
CyberDefenders
- Website: https://cyberdefenders.org/blueteam-ctf-challenges/?type=ctf
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: CyberDefenders is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Source list entry describing this security tool and its use case.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Learn Forensics > CTFs and Challenges.
CybersecurityGuide – Digital Forensics Careers
- Website: https://cybersecurityguide.org/careers/digital-forensics/
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: CybersecurityGuide – Digital Forensics Careers is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Guide on skills, certs, and career paths in cyber forensics.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Resources > Other.
Letter D
This letter section contains 12 tools.
dc3dd
- Website: https://sourceforge.net/projects/dc3dd/
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: dc3dd is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Improved version of dd.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Imaging.
dcfldd
- Website: https://sourceforge.net/projects/dcfldd/
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: dcfldd is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Different improved version of dd (this version has some bugs!, another version is on github ).
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Imaging.
DefCon CTFs
- Website: https://archive.ooo
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: DefCon CTFs is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: archive of DEF CON CTF challenges.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Learn Forensics > CTFs and Challenges.
dexter
- Website: https://github.com/coinbase/dexter
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: dexter is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Dexter is a forensics acquisition framework designed to be extensible and secure.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Frameworks.
dff
- Website: https://github.com/arxsys/dff
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: dff is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Forensic framework.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Frameworks.
DFIR
- Website: https://www.sans.org/cyber-security-summit/archives/dfir
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Threat Detection
What it does: DFIR is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: , ) - Threat hunting, Blue Team and DFIR summit slides.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Threat Detection and Hunting > Resources.
DFIR-ORC
- Website: https://github.com/dfir-orc
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome SOC
What it does: DFIR-ORC is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: ;.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Mission-critical means (tools/sensors) > Critical tools for CSIRT.
Digital Forensic Challenge Images
- Website: https://www.ashemery.com/dfir.html
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: Digital Forensic Challenge Images is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Two DFIR challenges with images.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Resources > File System Corpora.
Digital Forensics Tool Testing Images
- Website: https://sourceforge.net/projects/dftt/
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: Digital Forensics Tool Testing Images is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Source list entry describing this security tool and its use case.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Resources > File System Corpora.
Disk Arbitrator
- Website: https://github.com/aburgh/Disk-Arbitrator
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: Disk Arbitrator is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: A Mac OS X forensic utility designed to help the user ensure correct forensic procedures are followed during imaging of a disk device.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Disk image handling.
Docker Explorer
- Website: https://github.com/google/docker-explorer
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: Docker Explorer is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Extracts and interprets forensic artifacts from disk images of Docker Host systems.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Docker Forensics.
dof (Docker Forensics Toolkit)
- Website: https://github.com/docker-forensics-toolkit/toolkit
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: dof (Docker Forensics Toolkit) is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Extracts and interprets forensic artifacts from disk images of Docker Host systems.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Docker Forensics.
Letter E
This letter section contains 1 tools.
Extundelete
- Website: http://extundelete.sourceforge.net/
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome CTF
What it does: Extundelete is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Used for recovering lost data from mountable images.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Solve > Forensics.
Letter F
This letter section contains 13 tools.
FireEye Memoryze
- Website: https://fireeye.market/apps/211368
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: FireEye Memoryze is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: A free memory forensic software.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Acquisition.
FIT
- Website: https://github.com/fit-project/fit
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: FIT is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Forensic acquisition of web pages, emails, social media, etc.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Acquisition.
Forensic challenges
- Website: https://www.amanhardikar.com/mindmaps/ForensicChallenges.html
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: Forensic challenges is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Mindmap of forensic challenges.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Learn Forensics.
ForensicPosters
- Website: https://github.com/Invoke-IR/ForensicPosters
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: ForensicPosters is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Posters of file system structures.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Resources > Other.
Forensics
- Website: https://github.com/Cugu/awesome-forensics
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Malware Analysis, Awesome Penetration Testing
What it does: Forensics is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Source list entry describing this security tool and its use case.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Penetration Testing > Online Resources > Other Lists Online.
Forensics CTFs
- Website: https://github.com/apsdehal/awesome-ctf/blob/master/README.md#forensics
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: Forensics CTFs is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Source list entry describing this security tool and its use case.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Learn Forensics > CTFs and Challenges.
Forensics StartMe by Stark 4N6
- Website: https://startme.stark4n6.com
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: Forensics StartMe by Stark 4N6 is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Source list entry describing this security tool and its use case.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Resources > Web.
Forensics tools on Wikipedia
- Website: https://en.wikipedia.org/wiki/List_of_digital_forensics_tools
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: Forensics tools on Wikipedia is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Source list entry describing this security tool and its use case.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools.
ForensicsFocus
- Website: https://www.forensicfocus.com/
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: ForensicsFocus is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Source list entry describing this security tool and its use case.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Resources > Web.
FRED
- Website: https://www.pinguin.lu/fred
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: FRED is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Cross-platform microsoft registry hive editor.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Windows Artifacts.
Fsck.ext4
- Website: http://linux.die.net/man/8/fsck.ext3
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome CTF
What it does: Fsck.ext4 is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Used to fix corrupt filesystems.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Solve > Forensics.
FTK Imager
- Website: https://www.exterro.com/digital-forensics-software/ftk-imager
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: FTK Imager is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Free imageing tool for windows.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Imaging.
Fuji
- Website: https://github.com/Lazza/Fuji/
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: Fuji is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: MacOS forensic acquisition made simple. It creates full file system copies or targeted collection of Mac computers.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Acquisition.
Letter G
This letter section contains 3 tools.
Ghiro
- Website: https://github.com/Ghirensics/ghiro
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: Ghiro is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: A fully automated tool designed to run forensics analysis over a massive amount of images.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Picture Analysis.
Grafeas
- Website: https://grafeas.io/
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Cybersecurity Blue Team
What it does: Grafeas is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Open artifact metadata API to audit and govern your software supply chain.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Cybersecurity Blue Team > DevSecOps > Supply chain security.
Guymager
- Website: https://sourceforge.net/projects/guymager/
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: Guymager is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Open source version for disk imageing on linux systems.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Imaging.
Letter H
This letter section contains 3 tools.
hashlookup-forensic-analyser
- Website: https://github.com/hashlookup/hashlookup-forensic-analyser
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: hashlookup-forensic-analyser is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: A tool to analyse files from a forensic acquisition to find known/unknown hashes from API or using a local Bloom filter.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Frameworks.
Hashment
- Website: https://github.com/hashment/yaffs2-forensic-tool
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: Hashment is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Python forensic tool to analyze, dump, and recover deleted files from YAFFS2 partitions.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Acquisition.
hollows_hunter
- Website: https://github.com/hasherezade/hollows_hunter
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Threat Detection
What it does: hollows_hunter is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Scans all running processes, recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in-memory patches).
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Threat Detection and Hunting > Tools.
Letter I
This letter section contains 8 tools.
IE10Analyzer
- Website: https://github.com/moaistory/IE10Analyzer
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: IE10Analyzer is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: This tool can parse normal records and recover deleted records in WebCacheV01.dat.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Internet Artifacts.
iLEAPP
- Website: https://github.com/abrignoni/iLEAPP
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: iLEAPP is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: An iOS Logs, Events, And Plists Parser.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Mobile Forensics.
Incidents
- Website: https://github.com/veeral-patel/incidents
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: Incidents is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Web application for organizing non-trivial security investigations. Built on the idea that incidents are trees of tickets, where some tickets are leads.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Management.
InfoStealers
- Website: https://infostealers.info/en/info
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome OSINT
What it does: InfoStealers is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Indexes darknet-exposed infostealer logs and makes them searchable and actionable for security teams, investigators, researchers, and digital forensics professionals.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Email Search / Email Check.
IntelBase
- Website: https://intelbase.is/
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome OSINT
What it does: IntelBase is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Forensics platform focused on reverse email lookup and email data enrichment.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Email Search / Email Check.
iOS Frequent Locations Dumper
- Website: https://github.com/mac4n6/iOS-Frequent-Locations-Dumper
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: iOS Frequent Locations Dumper is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Dump the contents of the StateModel#.archive files located in /private/var/mobile/Library/Caches/com.apple.routined/.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Mobile Forensics.
IPED - Indexador e Processador de Evidências Digitais
- Website: https://github.com/sepinf-inc/IPED
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: IPED - Indexador e Processador de Evidências Digitais is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Brazilian Federal Police Tool for Forensic Investigations.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Frameworks.
IvySyn
- Website: https://gitlab.com/brown-ssl/ivysyn
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Fuzzing
What it does: IvySyn is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: IvySyn is a fully-automated framework for discovering memory error vulnerabilities in Deep Learning (DL) frameworks.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Fuzzing > Tools > API.
Letter J
This letter section contains 1 tools.
John the Ripper
- Website: https://www.openwall.com/john/
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: John the Ripper is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Password cracker.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Decryption.
Letter K
This letter section contains 3 tools.
KeeFarce
- Website: https://github.com/denandz/KeeFarce
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: KeeFarce is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Extract KeePass passwords from memory.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Memory Forensics.
Kroll Artifact Parser and Extractor (KAPE)
- Website: https://learn.duffandphelps.com/kape
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome CTF
What it does: Kroll Artifact Parser and Extractor (KAPE) is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Triage program.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Create > Forensics.
kube-forensics
- Website: https://github.com/keikoproj/kube-forensics
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Cybersecurity Blue Team
What it does: kube-forensics is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Allows a cluster administrator to dump the current state of a running pod and all its containers so that security professionals can perform off-line forensic analysis.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Cybersecurity Blue Team > Cloud platform security > Kubernetes.
Letter L
This letter section contains 3 tools.
libewf
- Website: https://github.com/libyal/libewf
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: libewf is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Libewf is a library and some tools to access the Expert Witness Compression Format (EWF, E01).
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Disk image handling.
Linux Expl0rer
- Website: https://github.com/intezer/linux-explorer
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: Linux Expl0rer is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Easy-to-use live forensics toolbox for Linux endpoints written in Python & Flask.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Live Forensics.
LOKI
- Website: https://github.com/ConsensusFuzz/LOKI
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Fuzzing
What it does: LOKI is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: LOKI is a blockchain consensus protocol fuzzing framework that detects the consensus memory related and logic bugs.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Fuzzing > Tools > Blockchain.
Letter M
This letter section contains 13 tools.
MacLocationsScraper
- Website: https://github.com/mac4n6/Mac-Locations-Scraper
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: MacLocationsScraper is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Dump the contents of the location database files on iOS and macOS.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > OS X Forensics.
macMRUParser
- Website: https://github.com/mac4n6/macMRU-Parser
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: macMRUParser is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Python script to parse the Most Recently Used (MRU) plist files on macOS into a more human friendly format.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > OS X Forensics.
Magnet AXIOM
- Website: https://www.magnetforensics.com/downloadaxiom
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome CTF
What it does: Magnet AXIOM is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Artifact-centric DFIR tool.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Create > Forensics.
MagnetForensics CTF Challenge
- Website: https://www.magnetforensics.com/blog/magnet-weekly-ctf-challenge/
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: MagnetForensics CTF Challenge is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Source list entry describing this security tool and its use case.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Learn Forensics > CTFs and Challenges.
Maltego
- Website: http://www.maltego.com/
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Penetration Testing
What it does: Maltego is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Proprietary software for open sources intelligence and forensics.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Penetration Testing > Open Sources Intelligence (OSINT).
MalwareTech Labs
- Website: https://malwaretech.com/labs/
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: MalwareTech Labs is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Source list entry describing this security tool and its use case.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Learn Forensics > CTFs and Challenges.
MEAT
- Website: https://github.com/jfarley248/MEAT
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: MEAT is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Perform different kinds of acquisitions on iOS devices.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Mobile Forensics.
MemLabs
- Website: https://github.com/stuxnet999/MemLabs
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: MemLabs is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Source list entry describing this security tool and its use case.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Learn Forensics > CTFs and Challenges.
MemProcFS
- Website: https://github.com/ufrisk/MemProcFS
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: MemProcFS is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: An easy and convenient way of accessing physical memory as files a virtual file system.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Memory Forensics.
MFT-Parsers
- Website: http://az4n6.blogspot.com/2015/09/whos-your-master-mft-parsers-reviewed.html
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: MFT-Parsers is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Comparison of MFT-Parsers.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Windows Artifacts > NTFS/MFT Processing.
MFTEcmd
- Website: https://binaryforay.blogspot.com/2018/06/introducing-mftecmd.html
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: MFTEcmd is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: MFT Parser by Eric Zimmerman.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Windows Artifacts > NTFS/MFT Processing.
MFTMactime
- Website: https://github.com/kero99/mftmactime
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: MFTMactime is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: MFT and USN parser that allows direct extraction in filesystem timeline format (mactime), dump all resident files in the MFT in their original folder structure and run yara rules over them all.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Windows Artifacts > NTFS/MFT Processing.
mig
- Website: https://github.com/mozilla/mig
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: mig is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Distributed & real time digital forensics at the speed of the cloud.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Live Forensics.
Letter N
This letter section contains 5 tools.
Netresec
- Website: https://www.netresec.com/index.ashx?page=Blog
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: Netresec is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Source list entry describing this security tool and its use case.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Resources > Blogs.
NTFS journal parser
- Website: http://strozfriedberg.github.io/ntfs-linker/
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: NTFS journal parser is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Source list entry describing this security tool and its use case.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Windows Artifacts > NTFS/MFT Processing.
NTFS USN Journal parser
- Website: https://github.com/PoorBillionaire/USN-Journal-Parser
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: NTFS USN Journal parser is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Source list entry describing this security tool and its use case.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Windows Artifacts > NTFS/MFT Processing.
NTFSTool
- Website: https://github.com/thewhiteninja/ntfstool
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: NTFSTool is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Complete NTFS forensics tool.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Windows Artifacts > NTFS/MFT Processing.
NW3C Chanllenges
- Website: https://nw3.ctfd.io
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: NW3C Chanllenges is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Source list entry describing this security tool and its use case.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Learn Forensics > CTFs and Challenges.
Letter O
This letter section contains 5 tools.
OfflineRegistryView
- Website: https://www.nirsoft.net/utils/offline_registry_view.html
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome CTF
What it does: OfflineRegistryView is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Simple tool for Windows that allows you to read offline Registry files from external drive and view the desired Registry key in .reg file format.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Solve > Forensics.
OpenBackupExtractor
- Website: https://github.com/vgmoose/OpenBackupExtractor
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: OpenBackupExtractor is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: An app for extracting data from iPhone and iPad backups.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Mobile Forensics.
OpenRelik
- Website: https://openrelik.org/
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: OpenRelik is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Forensic platform to store file artifacts and run workflows.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Frameworks.
osquery
- Website: https://github.com/osquery/osquery
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: osquery is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: SQL powered operating system analytics.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Live Forensics.
OSX Collect
- Website: https://github.com/YelpArchive/osxcollector
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: OSX Collect is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Source list entry describing this security tool and its use case.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > OS X Forensics.
Letter P
This letter section contains 8 tools.
PancakeViewer
- Website: https://github.com/forensicmatt/PancakeViewer
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: PancakeViewer is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Disk image viewer based in dfvfs, similar to the FTK Imager viewer.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Disk image handling.
PCILeech
- Website: https://github.com/ufrisk/pcileech
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Penetration Testing
What it does: PCILeech is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Uses PCIe hardware devices to read and write from the target system memory via Direct Memory Access (DMA) over PCIe.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Penetration Testing > Physical Access Tools.
PDF Streams Inflater
- Website: http://malzilla.sourceforge.net/downloads.html
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome CTF
What it does: PDF Streams Inflater is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Find and extract zlib files compressed in PDF files.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Solve > Forensics.
photorec
- Website: https://www.cgsecurity.org/wiki/PhotoRec
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: photorec is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: File carving tool.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Carving.
Pngcheck
- Website: http://www.libpng.org/pub/png/apps/pngcheck.html
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome CTF
What it does: Pngcheck is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Verifies the integrity of PNG and dump all of the chunk-level information in human-readable form.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Solve > Forensics.
Precision Widgets of North Dakota Intrusion
- Website: https://betweentwodfirns.blogspot.com/2017/11/dfir-ctf-precision-widgets-of-north.html
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: Precision Widgets of North Dakota Intrusion is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Source list entry describing this security tool and its use case.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Learn Forensics > CTFs and Challenges.
PyShadow
- Website: https://github.com/alicangnll/pyshadow
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: PyShadow is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: A library for Windows to read shadow copies, delete shadow copies, create symbolic links to shadow copies, and create shadow copies.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Windows Artifacts.
python-ntfs
- Website: https://github.com/williballenthin/python-ntfs
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: python-ntfs is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: NTFS analysis.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Windows Artifacts > NTFS/MFT Processing.
Letter R
This letter section contains 7 tools.
Real Digital Forensics
- Website: https://www.amzn.com/dp/0321240693
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Malware Analysis
What it does: Real Digital Forensics is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Computer.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Resources > Books.
RecuperaBit
- Website: https://github.com/Lazza/RecuperaBit
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: RecuperaBit is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Reconstruct and recover NTFS data.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Windows Artifacts > NTFS/MFT Processing.
Registry Dumper
- Website: http://www.kahusecurity.com/posts/registry_dumper_find_and_dump_hidden_registry_keys.html
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome CTF
What it does: Registry Dumper is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Dump your registry.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Create > Forensics.
Registry Viewer®
- Website: https://accessdata.com/product-download/registry-viewer-2-0-0
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome CTF
What it does: Registry Viewer® is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Used to view Windows registries.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Solve > Forensics.
RegRippy
- Website: https://github.com/airbus-cert/regrippy
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: RegRippy is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: A framework for reading and extracting useful forensics data from Windows registry hives.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Windows Artifacts.
ResourcesExtract
- Website: http://www.nirsoft.net/utils/resources_extract.html
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome CTF
What it does: ResourcesExtract is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Extract various filetypes from exes.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Solve > Forensics.
ReverseEngineering Challenges
- Website: https://challenges.re
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: ReverseEngineering Challenges is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Source list entry describing this security tool and its use case.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Learn Forensics > CTFs and Challenges.
Letter S
This letter section contains 11 tools.
SANS Digital Forensics
- Website: https://www.sans.org/cybersecurity-focus-areas/digital-forensics-incident-response
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: SANS Digital Forensics is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Source list entry describing this security tool and its use case.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Resources > Web.
SANS Investigative Forensics Toolkit (sift)
- Website: https://github.com/teamdfir/sift
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: SANS Investigative Forensics Toolkit (sift) is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Linux distribution for forensic analysis.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Distributions.
SANS Posters
- Website: https://www.sans.org/posters
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: SANS Posters is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Free posters provided by SANS.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Resources > Other.
Shellbags
- Website: https://github.com/williballenthin/shellbags
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome CTF
What it does: Shellbags is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Investigate NT_USER.dat files.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Solve > Forensics.
sherloq
- Website: https://github.com/GuidoBartoli/sherloq
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: sherloq is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: An open-source digital photographic image forensic toolset.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Picture Analysis.
sleuthkit
- Website: https://github.com/sleuthkit/sleuthkit
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Hacking, Awesome Forensics
What it does: sleuthkit is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: A library and collection of command-line digital forensics tools.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Frameworks.
Snow
- Website: https://sbmlabs.com/notes/snow_whitespace_steganography_tool
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome CTF
What it does: Snow is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: A Whitespace Steganography Tool.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Solve > Forensics.
Social Engineering
- Website: https://github.com/giuliacassara/awesome-social-engineering
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: Social Engineering is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Source list entry describing this security tool and its use case.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Related Awesome Lists.
Sonicvisualizer
- Website: https://www.sonicvisualiser.org
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: Sonicvisualizer is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Source list entry describing this security tool and its use case.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Steganography.
Steghide
- Website: https://github.com/StegHigh/steghide
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: Steghide is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: is a steganography program that hides data in various kinds of image and audio files.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Steganography.
swap_digger
- Website: https://github.com/sevagas/swap_digger
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: swap_digger is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: A bash script used to automate Linux swap analysis, automating swap extraction and searches for Linux user credentials, Web form credentials, Web form emails, etc.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Carving.
Letter T
This letter section contains 7 tools.
The Art of Memory Forensics
- Website: https://amzn.com/dp/1118825098
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Malware Analysis
What it does: The Art of Memory Forensics is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Detecting.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Resources > Books.
This Week In 4n6
- Website: https://thisweekin4n6.com/
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: This Week In 4n6 is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Weekly updates for forensics.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Resources > Blogs.
Timeline Explorer
- Website: https://binaryforay.blogspot.com/2017/04/introducing-timeline-explorer-v0400.html
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: Timeline Explorer is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Timeline Analysis tool for CSV and Excel files. Built for SANS FOR508 students.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Timeline Analysis.
timeliner
- Website: https://github.com/airbus-cert/timeliner
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: timeliner is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: A rewrite of mactime, a bodyfile reader.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Timeline Analysis.
TriageHasher
- Website: https://github.com/FlipForensics/TriageHasher
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: TriageHasher is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: A flexible hashing tool designed for triage collections on Windows, Linux and MacOS. Only hash files with a given extension and location.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Acquisition.
TRRespass
- Website: https://github.com/vusec/trrespass
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Penetration Testing
What it does: TRRespass is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Many-sided rowhammer tool suite able to reverse engineer the contents of DDR3 and DDR4 memory chips protected by Target Row Refresh mitigations.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Penetration Testing > Side-channel Tools.
turbinia
- Website: https://github.com/google/turbinia
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: turbinia is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Turbinia is an open-source framework for deploying, managing, and running forensic workloads on cloud platforms.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Frameworks.
Letter U
This letter section contains 4 tools.
UFADE
- Website: https://github.com/prosch88/UFADE
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: UFADE is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Extract files from iOS devices on Linux and MacOS. Mostly a wrapper for pymobiledevice3. Creates iTunes-style backups and advanced logical backups.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Acquisition.
unfurl
- Website: https://github.com/obsidianforensics/unfurl
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: unfurl is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Extract and visualize data from URLs.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Internet Artifacts.
unix_collector
- Website: https://github.com/op7ic/unix_collector
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: unix_collector is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: A live forensic collection script for UNIX-like systems as a single script.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Acquisition.
USBRip
- Website: https://github.com/snovvcrash/usbrip
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome CTF
What it does: USBRip is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Simple CLI forensics tool for tracking USB device artifacts (history of USB events) on GNU/Linux.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Solve > Forensics.
Letter W
This letter section contains 5 tools.
Wavsteg
- Website: https://github.com/samolds/wavsteg
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: Wavsteg is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: is a steganography program that hides data in various kinds of image and audio files.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Steganography.
WinFE
- Website: https://www.winfe.net/home
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: WinFE is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Windows Forensics enviroment.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Distributions.
WinSearchDBAnalyzer
- Website: https://github.com/moaistory/WinSearchDBAnalyzer
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: WinSearchDBAnalyzer is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: This tool can parse normal records and recover deleted records in Windows.edb.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Internet Artifacts.
WinTriage
- Website: https://www.securizame.com/wintriage-the-triage-tool-for-windows-dfirers/
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: WinTriage is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Wintriage is a live response tool that extracts Windows artifacts. It must be executed with local or domain administrator privileges and recommended to be done from an external drive.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Acquisition.
Wombat Forensics
- Website: https://github.com/pjrinaldi/wombatforensics
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: Wombat Forensics is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Forensic GUI tool.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Frameworks.
Letter X
This letter section contains 1 tools.
xmount
- Website: https://www.pinguin.lu/xmount
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: xmount is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Convert between different disk image formats.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Disk image handling.
Letter Z
This letter section contains 1 tools.
Zena Forensics
- Website: https://blog.digital-forensics.it/
- Model: Open Source
- Category: Digital Forensics & DFIR
- Source Lists: Awesome Forensics
What it does: Zena Forensics is used in digital forensics & dfir programs to support timeline creation, disk and memory evidence analysis, and legal-quality reporting. Source summaries describe it as: Source list entry describing this security tool and its use case.
Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.
Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.
Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Resources > Blogs.