
DMG2IMG is a free Digital Forensics and Incident Response tool. Security professionals most commonly compare it with . All 48 alternatives are matched by shared capabilities, tags, and NIST CSF 2.0 coverage.
A closer look at the 8 most relevant alternatives and competitors to DMG2IMG, including their key features and shared capabilities.
A read-only FUSE driver that enables Linux systems to mount and access Apple File System (APFS) volumes, including encrypted and fusion drives.
Shares 4 capabilities with DMG2IMG: Mac Os, IOS, Open Source, Disk Image
Forensic imaging tool for disk acquisition, iOS collection, and encryption
Digital forensics platform for evidence acquisition, analysis, and DFIR.
Automated Mac Forensic Triage Collector
wxHexEditor is a free cross-platform hex editor and disk editor for editing binary files, disk devices, and logical drives with data manipulation and checksum calculation features.
A command-line tool for extracting data from iOS mobile device backups created by iTunes on macOS systems.
A discontinued disk imaging utility originally developed by Intel that used block map files for efficient disk image copying operations.
A digital forensics tool that extracts and exports location database contents from iOS and macOS devices in KML or CSV formats.
A read-only FUSE driver that enables Linux systems to mount and access Apple File System (APFS) volumes, including encrypted and fusion drives.
Forensic imaging tool for disk acquisition, iOS collection, and encryption
Digital forensics platform for evidence acquisition, analysis, and DFIR.
wxHexEditor is a free cross-platform hex editor and disk editor for editing binary files, disk devices, and logical drives with data manipulation and checksum calculation features.
A command-line tool for extracting data from iOS mobile device backups created by iTunes on macOS systems.
A discontinued disk imaging utility originally developed by Intel that used block map files for efficient disk image copying operations.
A digital forensics tool that extracts and exports location database contents from iOS and macOS devices in KML or CSV formats.
A collection of Mac OS X and iOS forensics resources with a focus on artifact collection and collaboration.
Open Backup Extractor is an open source program for extracting data from iPhone and iPad backups.
Mobile forensic bundle for physical, logical & OTA acquisition of iOS/Android/cloud.
Digital forensics tools for detecting CSAM on devices and online platforms.
An open source .NET deobfuscator and unpacker that restores packed and obfuscated assemblies by reversing various obfuscation techniques.
A forensic toolkit for analyzing Android and iOS devices to detect potential spyware infections and security compromises using indicators of compromise.
A forensic analysis tool that extracts and parses logs, notifications, and system information from iOS/iPadOS devices and backups.
An open-source incident response case management tool
Fast disassembler producing reassemblable assembly code using Datalog
HexPrism is a fast, privacy-first hex editor built for CTFs and digital forensics.
libevt is a library to access and parse Windows Event Log (EVT) files.
A library for read-only access to QEMU Copy-On-Write (QCOW) image files, supporting multiple versions and compression formats for digital forensics analysis.
Unfurl is a URL analysis tool that extracts and visualizes data from URLs, breaking them down into components and presenting the information visually.
A library to access and manipulate RAW image files.
Free software for extracting Microsoft cabinet files, supporting all features and formats of Microsoft cabinet files and Windows CE installation files.
A library for accessing and parsing Windows NT Registry File (REGF) format files, designed for digital forensics and registry analysis applications.
A library to access FileVault Drive Encryption (FVDE) encrypted volumes on Mac OS X systems.
A library for accessing and parsing OLE 2 Compound File (OLECF) format files, including Microsoft Office documents and thumbs.db files.
A library and tools to access and analyze APFS file systems
An open source tool that generates YARA rules from installed software on running operating systems for efficient software identification in digital forensic investigations.
iOSForensic is a Python tool for forensic analysis on iOS devices, extracting files, logs, SQLite3 databases, and .plist files into XML.
A Yara ruleset designed to detect PHP shells and other webserver malware for malware analysis and threat detection.
Ghidra is an NSA-developed software reverse engineering framework that provides disassembly, decompilation, and analysis tools for examining compiled code across multiple platforms and processor architectures.
Browse and analyze iPhone/iPad backups with detailed file properties and various viewers.
A script for extracting common Windows artifacts from source images and VSCs with detailed dependencies and usage instructions.
An OCaml Ctypes wrapper for the YARA matching engine that enables malware identification capabilities in OCaml applications.
A Mac OS X forensic utility for ensuring correct forensic procedures during disk imaging.
BinaryAlert is an open-source serverless AWS pipeline that automatically scans files uploaded to S3 buckets with YARA rules and generates immediate alerts when malware is detected.
AfterGlow Cloud is a Django-based web application that allows users to upload data and generate graph visualizations through a browser interface.
COPS is a YAML-based schema standard for creating collaborative DFIR playbooks that provide structured guidance for incident response processes.
StringSifter is a machine learning tool that automatically ranks strings extracted from malware samples based on their relevance for analysis.
A DFVFS backed viewer project with a WxPython GUI, aiming to enhance file extraction and viewing capabilities.
A tool to quickly gather forensic artifacts from disk images or a live system into a lightweight container, aiding in digital forensic triage.
A Python 3 tool for analyzing XOR-encrypted data that can guess key lengths and decrypt XOR ciphers based on character frequency analysis.
PINT is a PIN tool that enables Lua scripting for Intel's PIN dynamic instrumentation framework, allowing researchers to inject custom code during binary analysis processes.
Toolkit for performing acquisitions on iOS devices with logical and filesystem acquisition support.
A Mac OS X computer forensics tool for analyzing system artifacts, user files, and logs with reputation verification and log aggregation capabilities.
A declarative language for describing binary data structures that compiles into parsers for multiple programming languages.
Dump iOS Frequent Locations from StateModel#.archive files.
Python script to parse macOS MRU plist files into human-friendly format
Common questions security professionals ask when evaluating alternatives and competitors to DMG2IMG.
The most popular alternatives to DMG2IMG include APFS FUSE Driver for Linux, Exterro FTK Imager Pro, Magnet Forensics, AutoMacTC, and wxHexEditor. These Digital Forensics and Incident Response tools offer similar capabilities and are frequently compared by security professionals evaluating their options.