⭐️ A curated list of awesome forensic analysis tools and resources
-
Updated
Oct 2, 2025
⭐️ A curated list of awesome forensic analysis tools and resources
❄️ PcapXray - A Network Forensics Tool - To visualize a Packet Capture offline as a Network Diagram including device identification, highlight important communication and file extraction
UAC is a powerful and extensible incident response tool designed for forensic investigators, security analysts, and IT professionals. It automates the collection of artifacts from a wide range of Unix-like systems, including AIX, ESXi, FreeBSD, Linux, macOS, NetBSD, NetScaler, OpenBSD and Solaris.
Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.
unix_collector is a Live Response collection script for Incident Response on UNIX-like systems using native binaries. Supports AIX, Android, ESXi, FreeBSD, Linux, macOS, NetBSD, NetScaler, OpenBSD and Solaris systems artifacts.
This will compile a list of Android, iOS, Linux malware techniques for attacking and detection purposes.
Kali Linux in Docker + Ubuntu 22.04 in Docker for Bug Bounty, Penetration Testing, Security Research, Computer Forensics and Reverse Engineering. Kali Linux inside with Docker with or without support with systemd, repository also contains Proof of Concept with kind (Kubernetes in Docker) to test Kali Linux with enabled systemd in K8s cluster
A Volatility plugin for finding sqlite database rows
An updated C# port of X-Ways X-Tensions API.
The forensic analysis write-up / walkthrough for forensic disk image.
Extract valid or partially valid domain names and IPs from malicious or invalid URLs.
Access Expert Witness Format (ewf/E01/L01) files using Golang
Guymager is a free forensic imager for media acquisition. It is based on libewf and libguytools.
Docker images of open source forensic tools
LiveDiff is a portable system-level differencing tool for Microsoft Windows-based operating systems
Dump a process memory and extract data based on regular expressions.
A python-based tool to extract forensic info from ActivitiesCache.db (Windows Activity Timeline)
CFREDS case study for subject code: CTMTCS S2 P2
Parrot OS (Core/Security) or just Parrot Tools in Docker with the usage of Makefile, Dockerfiles and docker-compose.yaml for Bug Bounty, Penetration Testing, Security Research, Computer Forensics and Reverse Engineering, repository also contains Proof of Concept with kind (K8s in Docker) for ParrotOS with/without systemd in K8s cluster
Add a description, image, and links to the computer-forensics topic page so that developers can more easily learn about it.
To associate your repository with the computer-forensics topic, visit your repo's landing page and select "manage topics."