Home
Categories
πŸ”Ž
Osint
🎩
Brute-force
πŸ₯·
Active directory
πŸ“΅
Wireless security
🌩️
Cloud Security
🧩
Network assessment
πŸ•ΈοΈ
Web vulnerability detection
πŸ“Ά
Wireless Attacks
πŸ“
Information Gathering Tools
πŸ‘“
Sniffing & Spoofing
⚠️
Stress Testing
βš—οΈ
Forensics Tools
πŸ’«
Vulnerability Analysis
Tools
Blog
Tools

βš—οΈ

Forensics Tools

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Explore other tools categories:

πŸ”Ž
Osint
🎩
Brute-force
πŸ₯·
Active directory
πŸ“΅
Wireless security
🌩️
Cloud Security
🧩
Network assessment
πŸ•ΈοΈ
Web vulnerability detection
πŸ“Ά
Wireless Attacks
πŸ“
Information Gathering Tools
πŸ‘“
Sniffing & Spoofing
⚠️
Stress Testing
βš—οΈ
Forensics Tools
πŸ’«
Vulnerability Analysis
20.11.23

Autopsy

With its extensive feature set for examining disc images and file systems, Autopsy is a potent digital forensics tool.
November 20, 2023
20.11.23

Guymager

Guymager is a potent imaging tool made for data gathering and digital forensics.
November 20, 2023
20.11.23

Plaso

A potent digital forensics tool for timeline analysis is Plaso, sometimes called log2timeline. It is particularly good at making super-timelines, which provide investigators a chronological rundown of everything that has happened on a system.
November 20, 2023
20.11.23

Chkrootkit

A straightforward yet powerful tool for locating rootkits on Unix-based systems is called Chkrootkit. Malicious software called rootkits can undermine a system's security by granting unauthorised access and disguising their existence.
November 20, 2023
5.4.24

Volatility

Volatility, also recognized as a versatile memory forensics framework, is an open-source tool invaluable for digital forensics investigations and memory analysis. When integrated with Kali Linux, the premier operating system for penetration testing and forensic analysis, Volatility emerges as a crucial asset for extracting valuable information from volatile memory dumps. In this article, we'll delve into Volatility's capabilities, provide guidelines for its installation on Kali Linux, and outline efficient utilization techniques for memory analysis in digital forensics.
April 5, 2024
5.4.24

Foremost

Foremost, also referred to as a digital forensic tool, is an open-source program designed for file recovery and data carving. Foremost proves invaluable in digital investigations, aiding in the extraction of files from various storage media, even if metadata is lost or damaged. When integrated with Kali Linux, the preferred operating system for penetration testing and forensic analysis, Foremost emerges as an indispensable tool. In this post, we'll explore Foremost's functionalities, provide instructions on how to install it on Kali Linux, and discuss efficient utilization techniques for file recovery in digital forensics.
April 5, 2024
5.4.24

Cuckoo

Cuckoo, also recognized as a malware analysis automation system, is an open-source platform tailored for automated malware analysis. Cuckoo proves invaluable in security assessments and research, offering capabilities for identifying and analyzing malware behavior, vulnerabilities, and network activity. When paired with Kali Linux, the preferred operating system for penetration testing, Cuckoo emerges as an essential tool for identifying and understanding malicious threats. In this post, we'll delve into Cuckoo's functionalities, provide instructions on how to install it on Kali Linux, and discuss efficient utilization techniques for automated malware analysis.
April 5, 2024
5.4.24

Magnet Forensic

Digital Evidence Investigator (DEI) is a comprehensive forensic software solution developed by Magnet Forensics, designed to assist digital investigators in analyzing and extracting evidence from various digital sources. When combined with the versatile penetration testing distro Kali Linux, DEI becomes an invaluable tool for forensic professionals, law enforcement agencies, and cybersecurity experts. Below, we'll delve into the features, installation process, and how to effectively use Digital Evidence Investigator on Kali Linux.
April 5, 2024

Navigation

HomeTools

Services by CQR

Penetration Testing
Social Engineering
OSINT Recon
Vulnerability Assessment
Automotive Penetration Testing
DevSecOps
Smart Contract Audit
Incident Response
SOC Services
Risk Assessment
API Penetration Testing
Active Directory Audit
Fuzz Testing
Security Code Review
NOC Service
Forensics
Reverse Engineering

Related Posts

OSINT Recon: what is open source inteligence

October 2, 2023

Explore Tools Categories

πŸ”Ž

Osint

🎩

Brute-force

πŸ₯·

Active directory

πŸ“΅

Wireless security

🌩️

Cloud Security

🧩

Network assessment

πŸ•ΈοΈ

Web vulnerability detection

πŸ“Ά

Wireless Attacks

πŸ“

Information Gathering Tools

πŸ‘“

Sniffing & Spoofing

⚠️

Stress Testing

βš—οΈ

Forensics Tools

πŸ’«

Vulnerability Analysis

Tools