Loading...

Looking for alternatives to Diffy (DEPRECATED)? A deprecated digital forensics tool by Netflix that helped investigators scope compromises across AWS cloud instances by identifying behavioral differences and outliers during security incidents. Browse 45 similar Security Operations tools below, compare features side-by-side, and find the best fit for your security stack.
Collaborative case management platform for incident response and investigation
Mobile forensic bundle for physical, logical & OTA acquisition of iOS/Android/cloud.
FIM and config change monitoring tool with baseline deviation detection.
A forensics toolkit for collecting digital evidence from Google Cloud Platform, Microsoft Azure, and Amazon Web Services during incident response investigations.
SIFT is a digital forensics toolkit that provides installation management, task execution, and machine image building capabilities for forensic investigations on Ubuntu systems.
A Python module for orchestrating remote forensic data acquisition and analysis from Linux instances using Amazon SSM.
A utility package that monitors hard drive health through SMART technology to detect and prevent disk failures before data loss occurs.
OCyara performs OCR on images and PDF files to extract text content and scan it against Yara rules for malware detection.
A read-only FUSE driver that enables Linux systems to mount and access Apple File System (APFS) volumes, including encrypted and fusion drives.
A library and tools for accessing and analyzing Linux Logical Volume Manager (LVM) volume system format.
edb is a powerful debugger for Linux binaries, enhancing reverse engineering efforts with a user-friendly interface and extensible plugins.
LiME is a Linux Memory Extractor tool for acquiring volatile memory from Linux and Linux-based devices, including Android, with features like full memory captures and minimal process footprint.
wxHexEditor is a free cross-platform hex editor and disk editor for editing binary files, disk devices, and logical drives with data manipulation and checksum calculation features.
A tool for creating compact Linux memory dumps compatible with popular debugging tools.
A Cross-Platform Forensic Framework for Google Chrome that allows investigation of history, downloads, bookmarks, cookies, and provides a full report.
Procmon for Linux is a reimagining of the classic Procmon tool from Windows, allowing Linux developers to trace syscall activity efficiently.
Sysmon for Linux is a tool that monitors and logs system activity with advanced filtering to identify malicious activity.
BinaryAlert is an open-source serverless AWS pipeline that automatically scans files uploaded to S3 buckets with YARA rules and generates immediate alerts when malware is detected.
Template-based incident response runbooks for AWS environments following NIST guidelines to help organizations handle common cloud security incidents.
POFR is a Linux forensic data collection system that captures process execution, file access, and network activity for incident response and compliance analysis.
A collection of tools to debug and inspect Kubernetes resources and applications, managing eBPF programs execution and mapping kernel primitives to Kubernetes resources.
A discontinued disk imaging utility originally developed by Intel that used block map files for efficient disk image copying operations.
Easy-to-use live forensics toolbox for Linux endpoints with various capabilities such as process inspection, memory analysis, and YARA scanning.
AMExtractor is an Android memory acquisition tool that dumps physical device memory using /dev/kmem without requiring kernel source code.
Python tool for remotely or locally dumping RAM of a Linux client for digital forensics analysis.
A portable Rust-based tool for acquiring volatile memory from Linux systems without requiring prior knowledge of the target OS distribution or kernel.
Drltrace is a dynamic API calls tracer for Windows and Linux applications.
A decentralized network panic button that triggers emergency system shutdowns across networked machines via UDP broadcasts and HTTP to prevent cold boot attacks.
Porting GNU/Linux userland tools to the bionic/Linux userland of Android to provide access to the audit stream for Android applications with minimal overhead.
CyLR is a Live Response Collection tool for quickly and securely collecting forensic artifacts from hosts with NTFS file systems.
A modern tool for Windows kernel exploration and observability with a focus on security.
A wrapper around jNetPcap for packet capturing with Clojure, available for Linux and Windows.
A bash script for automating Linux swap analysis for post-exploitation or forensics purposes.
A command-line forensics tool for tracking and analyzing USB device artifacts and connection history on Linux systems.
pcapfex is a forensic tool that extracts files from packet capture data by analyzing network traffic and identifying embedded file content.
A Python-based modular incident response tool for AWS environments that enables automated security actions across EC2, IAM, VPC, and other AWS resources.
A proof of concept for using the SSM Agent in Fargate for incident response
AWS IR is a Python command line utility for automated incident response and mitigation of instance and key compromises in Amazon Web Services environments.
An AWS incident response framework that uses Athena to analyze CloudTrail events and EventBridge for notifications to investigate API activity and detect security misconfigurations.
A Python tool that analyzes AWS CloudTrail data to summarize IAM principal activities, API calls, regions, IP addresses, and user agents with configurable timeframes and visualization options.
Margarita Shotgun is a Python tool that enables remote memory acquisition from target systems through command line interface, supporting Linux distributions and other operating systems via Docker containers.
A collection of Android Fakebank and Tizi samples for analyzing spyware on Android devices.
A utility for recovering deleted files from ext3 or ext4 partitions.
A javascript malware analysis tool with backend code execution.
A comprehensive Linux log analysis tool that streamlines the investigation of security incidents by extracting and organizing critical details from supported log files.
Get strategic cybersecurity insights in your inbox