
Top picks: APFS FUSE Driver for Linux, wxHexEditor, DMG2IMG — plus 45 more compared.
Security OperationsBmaptool is a free tool. Security professionals most commonly compare it with . All 48 alternatives are matched by shared capabilities, tags, and NIST CSF 2.0 coverage.
A closer look at the 8 most relevant alternatives and competitors to Bmaptool, including their key features and shared capabilities.
A read-only FUSE driver that enables Linux systems to mount and access Apple File System (APFS) volumes, including encrypted and fusion drives.
Shares 3 capabilities with Bmaptool: Linux, Open Source, Disk Image
wxHexEditor is a free cross-platform hex editor and disk editor for editing binary files, disk devices, and logical drives with data manipulation and checksum calculation features.
DMG2IMG converts Apple compressed DMG archives to standard HFS+ image files supporting zlib, bzip2, and LZFSE compression formats.
Forensic imaging tool for disk acquisition, iOS collection, and encryption
FIM and config change monitoring tool with baseline deviation detection.
Digital forensics tools for detecting CSAM on devices and online platforms.
Digital forensics platform for evidence acquisition, analysis, and DFIR.
An open source .NET deobfuscator and unpacker that restores packed and obfuscated assemblies by reversing various obfuscation techniques.
A read-only FUSE driver that enables Linux systems to mount and access Apple File System (APFS) volumes, including encrypted and fusion drives.
wxHexEditor is a free cross-platform hex editor and disk editor for editing binary files, disk devices, and logical drives with data manipulation and checksum calculation features.
DMG2IMG converts Apple compressed DMG archives to standard HFS+ image files supporting zlib, bzip2, and LZFSE compression formats.
Forensic imaging tool for disk acquisition, iOS collection, and encryption
FIM and config change monitoring tool with baseline deviation detection.
Digital forensics tools for detecting CSAM on devices and online platforms.
Digital forensics platform for evidence acquisition, analysis, and DFIR.
An open source .NET deobfuscator and unpacker that restores packed and obfuscated assemblies by reversing various obfuscation techniques.
A utility package that monitors hard drive health through SMART technology to detect and prevent disk failures before data loss occurs.
OCyara performs OCR on images and PDF files to extract text content and scan it against Yara rules for malware detection.
An open-source incident response case management tool
Fast disassembler producing reassemblable assembly code using Datalog
HexPrism is a fast, privacy-first hex editor built for CTFs and digital forensics.
libevt is a library to access and parse Windows Event Log (EVT) files.
A library for read-only access to QEMU Copy-On-Write (QCOW) image files, supporting multiple versions and compression formats for digital forensics analysis.
Unfurl is a URL analysis tool that extracts and visualizes data from URLs, breaking them down into components and presenting the information visually.
A library to access and manipulate RAW image files.
Free software for extracting Microsoft cabinet files, supporting all features and formats of Microsoft cabinet files and Windows CE installation files.
A library for accessing and parsing Windows NT Registry File (REGF) format files, designed for digital forensics and registry analysis applications.
A library for accessing and parsing OLE 2 Compound File (OLECF) format files, including Microsoft Office documents and thumbs.db files.
A library and tools for accessing and analyzing Linux Logical Volume Manager (LVM) volume system format.
edb is a powerful debugger for Linux binaries, enhancing reverse engineering efforts with a user-friendly interface and extensible plugins.
LiME is a Linux Memory Extractor tool for acquiring volatile memory from Linux and Linux-based devices, including Android, with features like full memory captures and minimal process footprint.
An open source tool that generates YARA rules from installed software on running operating systems for efficient software identification in digital forensic investigations.
A Yara ruleset designed to detect PHP shells and other webserver malware for malware analysis and threat detection.
A tool for creating compact Linux memory dumps compatible with popular debugging tools.
Ghidra is an NSA-developed software reverse engineering framework that provides disassembly, decompilation, and analysis tools for examining compiled code across multiple platforms and processor architectures.
A deprecated digital forensics tool by Netflix that helped investigators scope compromises across AWS cloud instances by identifying behavioral differences and outliers during security incidents.
A Cross-Platform Forensic Framework for Google Chrome that allows investigation of history, downloads, bookmarks, cookies, and provides a full report.
A script for extracting common Windows artifacts from source images and VSCs with detailed dependencies and usage instructions.
Procmon for Linux is a reimagining of the classic Procmon tool from Windows, allowing Linux developers to trace syscall activity efficiently.
Sysmon for Linux is a tool that monitors and logs system activity with advanced filtering to identify malicious activity.
An OCaml Ctypes wrapper for the YARA matching engine that enables malware identification capabilities in OCaml applications.
BinaryAlert is an open-source serverless AWS pipeline that automatically scans files uploaded to S3 buckets with YARA rules and generates immediate alerts when malware is detected.
AfterGlow Cloud is a Django-based web application that allows users to upload data and generate graph visualizations through a browser interface.
COPS is a YAML-based schema standard for creating collaborative DFIR playbooks that provide structured guidance for incident response processes.
StringSifter is a machine learning tool that automatically ranks strings extracted from malware samples based on their relevance for analysis.
A DFVFS backed viewer project with a WxPython GUI, aiming to enhance file extraction and viewing capabilities.
A tool to quickly gather forensic artifacts from disk images or a live system into a lightweight container, aiding in digital forensic triage.
POFR is a Linux forensic data collection system that captures process execution, file access, and network activity for incident response and compliance analysis.
A Python 3 tool for analyzing XOR-encrypted data that can guess key lengths and decrypt XOR ciphers based on character frequency analysis.
PINT is a PIN tool that enables Lua scripting for Intel's PIN dynamic instrumentation framework, allowing researchers to inject custom code during binary analysis processes.
A collection of tools to debug and inspect Kubernetes resources and applications, managing eBPF programs execution and mapping kernel primitives to Kubernetes resources.
Easy-to-use live forensics toolbox for Linux endpoints with various capabilities such as process inspection, memory analysis, and YARA scanning.
AMExtractor is an Android memory acquisition tool that dumps physical device memory using /dev/kmem without requiring kernel source code.
A declarative language for describing binary data structures that compiles into parsers for multiple programming languages.
Python tool for remotely or locally dumping RAM of a Linux client for digital forensics analysis.
Common questions security professionals ask when evaluating alternatives and competitors to Bmaptool.
The most popular alternatives to Bmaptool include APFS FUSE Driver for Linux, wxHexEditor, DMG2IMG, Exterro FTK Imager Pro, and SafenSoft SoftControl Change Monitoring. These Digital Forensics and Incident Response tools offer similar capabilities and are frequently compared by security professionals evaluating their options.