Close Menu
    What's Hot

    Why GRC Services Are Vital for Business Growth and Compliance in 2025

    July 1, 2025

    Ultimate Guide to Attack Surface Scanning

    April 10, 2025

    Recent Trends in Zero Trust Architecture

    March 3, 2025
    Facebook X (Twitter) Instagram LinkedIn WhatsApp
    HITH Blog – HackerinthehouseHITH Blog – Hackerinthehouse
    • Bug Bounty

      A Beginner’s guide to Active Directory Penetration Testing

      June 21, 2023

      Building an XSS Scanner with Python

      February 27, 2023

      Journey to Website Security: Uncovering Hyperlink Injection Dangers

      February 24, 2023

      File Upload XSS | Find XSS in a different way while doing Bug bounty and Pentesting

      January 13, 2023

      How To Find DOM-based XSS Vulnerability

      December 27, 2022
    • Pen Testing

      Privileged Escalation: How Hackers Exploit Permissions to Compromise Your Systems

      March 5, 2024

      The Ultimate Guide to Vulnerability Scanning

      December 13, 2023

      Top 10 Tools for Real World Red Teaming

      November 18, 2023

      Locking Down OAuth 2.0: Critical Steps to Protect User Accounts and Data

      November 10, 2023

      Detailed guide on Password Transmutations

      April 29, 2023
    • Cyber Security

      Why GRC Services Are Vital for Business Growth and Compliance in 2025

      July 1, 2025

      Ultimate Guide to Attack Surface Scanning

      April 10, 2025

      Recent Trends in Zero Trust Architecture

      March 3, 2025

      Modern Defensive Cybersecurity Services

      December 29, 2024

      A Comprehensive Guide on Cyber Security Services VS Cyber Security Products

      June 14, 2024
    • Services
    • Product
      • Certifications
    • More
      1. Ethical Hacking
      2. Kali Linux
      3. Write Ups
      4. CTF
      5. Blockchain
      6. Machine Learning
      7. Computer Science
      8. View All

      Journey to Website Security: Uncovering Hyperlink Injection Dangers

      February 24, 2023

      Pentest/VAPT RoE and Best Practices

      February 3, 2023

      Emoji Deploy Attack Chain

      January 24, 2023

      Introduction to Information Security

      January 11, 2023

      Cyber Security Roadmap (Part-2)

      October 25, 2022

      How to install waybacksurls in kali linux (2022)

      September 23, 2022

      How To Find Hidden Parameters

      November 12, 2022

      Top 10 Subdomain Takeover Reports

      November 6, 2022

      Pause DeSync Attack :

      November 3, 2022

      Bypassing OTP Verification Methods

      October 31, 2022

      Tryhackme Vulnversity walkthrough

      September 26, 2022

      Why GRC Services Are Vital for Business Growth and Compliance in 2025

      July 1, 2025

      Ultimate Guide to Attack Surface Scanning

      April 10, 2025

      Recent Trends in Zero Trust Architecture

      March 3, 2025

      Modern Defensive Cybersecurity Services

      December 29, 2024

      A Peek into Facial Recognition Technology

      August 21, 2023

      How Data Scientists and Machine Learning Engineers Differs

      November 8, 2022

      Artificial Neural Networks with ML

      November 4, 2022

      INTRODUCTION TO MACHINE LEARNING

      October 20, 2022

      Robotic Process Automation: The Key to Effortless Efficiency

      September 18, 2024

      BCI: Merging Minds With Machines

      August 18, 2023

      Is Quantum Computing the future of Computing?

      August 16, 2023

      Why GRC Services Are Vital for Business Growth and Compliance in 2025

      July 1, 2025

      Ultimate Guide to Attack Surface Scanning

      April 10, 2025

      Recent Trends in Zero Trust Architecture

      March 3, 2025

      Modern Defensive Cybersecurity Services

      December 29, 2024
    HITH Blog – HackerinthehouseHITH Blog – Hackerinthehouse
    Home»Cyber Security»A Comprehensive guide to Cyber Forensics
    Cyber Security

    A Comprehensive guide to Cyber Forensics

    Lohitaksh NandanBy Lohitaksh NandanOctober 4, 2022No Comments8 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Cybersecurity Forensics

    Welcome to the world of forensics in Cybersecurity. A collection of forensics tools, software, libraries, learning tutorials, frameworks, academic and practical resources in Cybersecurity.

    Thanks to all contributors, you’re awesome and wouldn’t be possible without you! Our goal is to build a categorized community-driven collection of very well-known resources.

    Collections

    • AboutDFIR – The Definitive Compendium Project – Collection of forensic resources for learning and research. Offers lists of certifications, books, blogs, challenges and more
    • DFIR.Training – Database of forensic resources focused on events, tools and more
    • ForensicArtifacts.com Artifact Repository – Machine-readable knowledge base of forensic artifacts.

    Tools

    • Forensics tools on Wikipedia
    • Eric Zimmerman’s Tools

    Distributions

    • bitscout – LiveCD/LiveUSB for remote forensic acquisition and analysis
    • Remnux – Distro for reverse-engineering and analyzing malicious software
    • SANS Investigative Forensics Toolkit (sift) – Linux distribution for forensic analysis
    • Tsurugi Linux – Linux distribution for forensic analysis
    • WinFE – Windows Forensics enviroment

    Frameworks

    • Autopsy – SleuthKit GUI
    • dff – Forensic framework
    • dexter – Dexter is a forensics acquisition framework designed to be extensible and secure
    • IntelMQ – IntelMQ collects and processes security feeds
    • Kuiper – Digital Investigation Platform
    • Laika BOSS – Laika is an object scanner and intrusion detection system
    • PowerForensics – PowerForensics is a framework for live disk forensic analysis
    • The Sleuth Kit – Tools for low level forensic analysis
    • turbinia – Turbinia is an open-source framework for deploying, managing, and running forensic workloads on cloud platforms
    • IPED – Indexador e Processador de Evidências Digitais – Brazilian Federal Police Tool for Forensic Investigations
    • Wombat Forensics – Forensic GUI tool

    Live Forensics

    • grr – GRR Rapid Response: remote live forensics for incident response
    • Linux Expl0rer – Easy-to-use live forensics toolbox for Linux endpoints written in Python & Flask
    • mig – Distributed & real time digital forensics at the speed of the cloud
    • osquery – SQL powered operating system analytics
    • UAC – UAC (Unix-like Artifacts Collector) is a Live Response collection tool for Incident Reponse that makes use of built-in tools to automate the collection of Unix-like systems artifacts. Supported systems: AIX, FreeBSD, Linux, macOS, NetBSD, Netscaler, OpenBSD and Solaris.

    IOC Scanner

    • Fenrir – Simple Bash IOC Scanner
    • Loki – Simple IOC and Incident Response Scanner
    • Redline – Free endpoint security tool from FireEye
    • THOR Lite – Free IOC and YARA Scanner

    Acquisition

    • artifactcollector – A customizable agent to collect forensic artifacts on any Windows, macOS or Linux system
    • ArtifactExtractor – Extract common Windows artifacts from source images and VSCs
    • AVML – A portable volatile memory acquisition tool for Linux
    • Belkasoft RAM Capturer – Volatile Memory Acquisition Tool
    • CrowdResponse – A static host data collection tool by CrowdStrike
    • DFIR ORC – Forensics artefact collection tool for systems running Microsoft Windows
    • FastIR Collector – Collect artifacts on windows
    • FireEye Memoryze – A free memory forensic software
    • LiME – Loadable Kernel Module (LKM), which allows the acquisition of volatile memory from Linux and Linux-based devices, formerly called DMD
    • Magnet RAM Capture – A free imaging tool designed to capture the physical memory
    • Velociraptor – Velociraptor is a tool for collecting host based state information using Velocidex Query Language (VQL) queries
    • WinTriage – Wintriage is a live response tool that extracts Windows artifacts. It must be executed with local or domain administrator privileges and recommended to be done from an external drive.

    Imaging

    • dc3dd – Improved version of dd
    • dcfldd – Different improved version of dd (this version has some bugs!, another version is on github adulau/dcfldd)
    • FTK Imager – Free imageing tool for windows
    • Guymager – Open source version for disk imageing on linux systems

    Carving

    • bstrings – Improved strings utility
    • bulk_extractor – Extracts information such as email addresses, creditcard numbers and histrograms from disk images
    • floss – Static analysis tool to automatically deobfuscate strings from malware binaries
    • photorec – File carving tool
    • swap_digger – A bash script used to automate Linux swap analysis, automating swap extraction and searches for Linux user credentials, Web form credentials, Web form emails, etc.

    Memory Forensics

    • inVtero.net – High speed memory analysis framework developed in .NET supports all Windows x64, includes code integrity and write support
    • KeeFarce – Extract KeePass passwords from memory
    • MemProcFS – An easy and convenient way of accessing physical memory as files a virtual file system.
    • Rekall – Memory Forensic Framework
    • volatility – The memory forensic framework
    • VolUtility – Web App for Volatility framework

    Network Forensics

    • Kismet – A passive wireless sniffer
    • NetworkMiner – Network Forensic Analysis Tool
    • WireShark – A network protocol analyzer

    Windows Artifacts

    • Beagle – Transform data sources and logs into graphs
    • FRED – Cross-platform microsoft registry hive editor
    • LastActivityView – LastActivityView by Nirsoftis a tool for Windows operating system that collects information from various sources on a running system, and displays a log of actions made by the user and events occurred on this computer.
    • LogonTracer – Investigate malicious Windows logon by visualizing and analyzing Windows event log
    • python-evt – Pure Python parser for classic Windows Event Log files (.evt)
    • RegRipper3.0 – RegRipper is an open source Perl tool for parsing the Registry and presenting it for analysis
    • RegRippy – A framework for reading and extracting useful forensics data from Windows registry hives

    NTFS/MFT Processing

    • MFT-Parsers – Comparison of MFT-Parsers
    • MFTEcmd – MFT Parser by Eric Zimmerman
    • MFTExtractor – MFT-Parser
    • NTFS journal parser
    • NTFS USN Journal parser
    • RecuperaBit – Reconstruct and recover NTFS data
    • python-ntfs – NTFS analysis

    OS X Forensics

    • APFS Fuse – A read-only FUSE driver for the new Apple File System
    • mac_apt (macOS Artifact Parsing Tool) – Extracts forensic artifacts from disk images or live machines
    • MacLocationsScraper – Dump the contents of the location database files on iOS and macOS
    • macMRUParser – Python script to parse the Most Recently Used (MRU) plist files on macOS into a more human friendly format
    • OSXAuditor
    • OSX Collect

    Mobile Forensics

    • Andriller – A software utility with a collection of forensic tools for smartphones
    • ALEAPP – An Android Logs Events and Protobuf Parser
    • ArtEx – Artifact Examiner for iOS Full File System extractions
    • iLEAPP – An iOS Logs, Events, And Plists Parser
    • iOS Frequent Locations Dumper – Dump the contents of the StateModel#.archive files located in /private/var/mobile/Library/Caches/com.apple.routined/
    • MEAT – Perform different kinds of acquisitions on iOS devices
    • MobSF – An automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.
    • OpenBackupExtractor – An app for extracting data from iPhone and iPad backups.

    Docker Forensics

    • dof (Docker Forensics Toolkit) – Extracts and interprets forensic artifacts from disk images of Docker Host systems
    • Docker Explorer Extracts and interprets forensic artifacts from disk images of Docker Host systems

    Internet Artifacts

    • ChromeCacheView – A small utility that reads the cache folder of Google Chrome Web browser, and displays the list of all files currently stored in the cache
    • chrome-url-dumper – Dump all local stored infromation collected by Chrome
    • hindsight – Internet history forensics for Google Chrome/Chromium
    • unfurl – Extract and visualize data from URLs

    Timeline Analysis

    • DFTimewolf – Framework for orchestrating forensic collection, processing and data export using GRR and Rekall
    • plaso – Extract timestamps from various files and aggregate them
    • Timeline Explorer – Timeline Analysis tool for CSV and Excel files. Built for SANS FOR508 students
    • timeliner – A rewrite of mactime, a bodyfile reader
    • timesketch – Collaborative forensic timeline analysis

    Disk image handling

    • Disk Arbitrator – A Mac OS X forensic utility designed to help the user ensure correct forensic procedures are followed during imaging of a disk device
    • imagemounter – Command line utility and Python package to ease the (un)mounting of forensic disk images
    • libewf – Libewf is a library and some tools to access the Expert Witness Compression Format (EWF, E01)
    • PancakeViewer – Disk image viewer based in dfvfs, similar to the FTK Imager viewer
    • xmount – Convert between different disk image formats

    Decryption

    • hashcat – Fast password cracker with GPU support
    • John the Ripper – Password cracker

    Management

    • dfirtrack – Digital Forensics and Incident Response Tracking application, track systems
    • Incidents – Web application for organizing non-trivial security investigations. Built on the idea that incidents are trees of tickets, where some tickets are leads

    Picture Analysis

    • Ghiro – A fully automated tool designed to run forensics analysis over a massive amount of images
    • sherloq – An open-source digital photographic image forensic toolset

    Metadata Forensics

    • ExifTool by Phil Harvey
    • FOCA – FOCA is a tool used mainly to find metadata and hidden information in the documents

    Steganography

    • Sonicvisualizer
    • Steghide – is a steganography program that hides data in various kinds of image and audio files
    • Wavsteg – is a steganography program that hides data in various kinds of image and audio files
    • Zsteg – A steganographic coder for WAV files

    Learn Forensics

    • Forensic challenges – Mindmap of forensic challenges
    • OpenLearn – Digital forensic course
    • Training material – Online training material by European Union Agency for Network and Information Security for different topics (e.g. Digital forensics, Network forensics)

    CTFs & Challenges

    • Champlain College DFIR CTF
    • CyberDefenders
    • DefCon CTFs – archive of DEF CON CTF challenges.
    • Forensics CTFs
    • MagnetForensics CTF Challenge
    • MalwareTech Challenges
    • MalwareTraffic Analysis
    • MemLabs
    • NW3C Chanllenges
    • Precision Widgets of North Dakota Intrusion
    • ReverseEngineering Challenges

    Resources

    • Web

    • ForensicsFocus
    • Insecstitute Resources
    • SANS Digital Forensics

    • Blogs

    • FlashbackData
    • Netresec
    • roDigitalForensics
    • SANS Forensics Blog
    • SecurityAffairs – blog by Pierluigi Paganini
    • thisweekin4n6.wordpress.com – Weekly updates for forensics
    • Zena Forensics

    • Books

    • Network Forensics: Tracking Hackers through Cyberspace – Learn to recognize hackers’ tracks and uncover network-based evidence
    • The Art of Memory Forensics – Detecting Malware and Threats in Windows, Linux, and Mac Memory
    • The Practice of Network Security Monitoring – Understanding Incident Detection and Response

    File System Corpora

    • Digital Forensic Challenge Images – Two DFIR challenges with images
    • Digital Forensics Tool Testing Images
    • The CFReDS Project
      • Hacking Case (4.5 GB NTFS Image)

    • Other

    • /r/computerforensics/ – Subreddit for computer forensics
    • /r/LearnDigitalForensics – Subreddit for learning Digital Forensics
    • ForensicPosters – Posters of file system structures
    • SANS Posters – Free posters provided by SANS

    Thank You!

    Author

    • Lohitaksh Nandan
      Lohitaksh Nandan

      View all posts

    Cyber Forensics Cyber-Security Digital Forensics Forensics roadmaps
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleIDOR EXPLAINED
    Next Article Nmap Series Part-2 | Continued
    Lohitaksh Nandan
    • X (Twitter)
    • Instagram

    Related Posts

    Cyber Security

    Why GRC Services Are Vital for Business Growth and Compliance in 2025

    July 1, 2025
    Cyber Security

    Ultimate Guide to Attack Surface Scanning

    April 10, 2025
    Cyber Security

    Recent Trends in Zero Trust Architecture

    March 3, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Advertisement
    Top Posts

    How to install waybacksurls in kali linux (2022)

    September 23, 20222,607 Views

    File Upload XSS | Find XSS in a different way while doing Bug bounty and Pentesting

    January 13, 2023913 Views

    OSCP Cheat Sheet

    October 16, 2022864 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Advertisement
    X (Twitter) Instagram LinkedIn WhatsApp Telegram
    • About us
    • Contact Us
    • Privacy Policy
    • Terms
    © 2025 HITH Blog. Powered by Hackerinthehouse.

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.