
libsmraw is a free Digital Forensics and Incident Response tool. Security professionals most commonly compare it with . All 48 alternatives are matched by shared capabilities, tags, and NIST CSF 2.0 coverage.
A closer look at the 8 most relevant alternatives and competitors to libsmraw, including their key features and shared capabilities.
HexPrism is a fast, privacy-first hex editor built for CTFs and digital forensics.
Free software for extracting Microsoft cabinet files, supporting all features and formats of Microsoft cabinet files and Windows CE installation files.
A library for accessing and parsing OLE 2 Compound File (OLECF) format files, including Microsoft Office documents and thumbs.db files.
wxHexEditor is a free cross-platform hex editor and disk editor for editing binary files, disk devices, and logical drives with data manipulation and checksum calculation features.
A script for extracting common Windows artifacts from source images and VSCs with detailed dependencies and usage instructions.
An OCaml Ctypes wrapper for the YARA matching engine that enables malware identification capabilities in OCaml applications.
A DFVFS backed viewer project with a WxPython GUI, aiming to enhance file extraction and viewing capabilities.
A Golang application that stores and queries NIST NSRL Reference Data Set for MD5 and SHA1 hash lookups using Bolt database technology.
HexPrism is a fast, privacy-first hex editor built for CTFs and digital forensics.
Free software for extracting Microsoft cabinet files, supporting all features and formats of Microsoft cabinet files and Windows CE installation files.
A library for accessing and parsing OLE 2 Compound File (OLECF) format files, including Microsoft Office documents and thumbs.db files.
wxHexEditor is a free cross-platform hex editor and disk editor for editing binary files, disk devices, and logical drives with data manipulation and checksum calculation features.
A script for extracting common Windows artifacts from source images and VSCs with detailed dependencies and usage instructions.
An OCaml Ctypes wrapper for the YARA matching engine that enables malware identification capabilities in OCaml applications.
A DFVFS backed viewer project with a WxPython GUI, aiming to enhance file extraction and viewing capabilities.
A Golang application that stores and queries NIST NSRL Reference Data Set for MD5 and SHA1 hash lookups using Bolt database technology.
Malware scanning tool for DFIR using 40+ engines from ReversingLabs
Malware analysis platform for SOC teams with binary analysis and threat detection
Incident investigation tool for info risks, user activity, and file exposure.
Email forensics tool for analyzing MIME header fields across 20+ formats.
FIM and config change monitoring tool with baseline deviation detection.
AI-powered file analysis platform delivering malware verdicts in natural language.
AI-powered malware analysis & threat research platform with chat interface.
An open source .NET deobfuscator and unpacker that restores packed and obfuscated assemblies by reversing various obfuscation techniques.
A versatile steganography tool with various installation options and detailed usage instructions.
A read-only FUSE driver that enables Linux systems to mount and access Apple File System (APFS) volumes, including encrypted and fusion drives.
A Windows context menu integration tool that scans files and folders for malware patterns, crypto signatures, and malicious documents using Yara rules and PEID signatures.
Steghide is a steganography program for hiding data in image and audio files.
A forensic analysis tool that extracts and parses logs, notifications, and system information from iOS/iPadOS devices and backups.
An open-source incident response case management tool
Fast disassembler producing reassemblable assembly code using Datalog
A command-line tool for creating hex dumps, converting between binary and human-readable representations, and patching binary files.
libevt is a library to access and parse Windows Event Log (EVT) files.
A static analysis framework for extracting key characteristics from various file formats
A free endpoint security tool for host investigative capabilities to find signs of malicious activity through memory and file analysis.
Unfurl is a URL analysis tool that extracts and visualizes data from URLs, breaking them down into components and presenting the information visually.
Falcon Sandbox is a malware analysis framework that provides in-depth static and dynamic analysis of files, offering hybrid analysis, behavior indicators, and integrations with various security tools.
A library for accessing and parsing Extensible Storage Engine (ESE) Database Files used by Microsoft applications like Windows Search, Exchange, and Active Directory for forensic analysis purposes.
A library for accessing and parsing Windows NT Registry File (REGF) format files, designed for digital forensics and registry analysis applications.
An open source format for storing digital evidence and data, with a C/C++ library for creating, reading, and manipulating AFF4 images.
A command-line tool that extracts detailed technical information, metadata, and checksums from JPEG image files with support for multiple output formats.
A library and tools to access and manipulate VMware Virtual Disk (VMDK) files.
A library and tools for accessing and analyzing Linux Logical Volume Manager (LVM) volume system format.
A file search and query tool for ops and security experts.
Advanced threat prevention and detection platform leveraging Deep CDR, Multiscanning, and Sandbox technologies to protect against data breaches and ransom attacks.
A command-line utility for extracting human-readable text from binary files.
MetaDefender Cloud offers advanced threat prevention using technologies like Multiscanning, Deep CDR, and Sandbox.
Valkyrie is a sophisticated file verdict system that enhances malware detection through behavioral analysis and extensive file feature examination.
A comprehensive malware-analysis tool that utilizes external AV scanners to identify malicious elements in binary files.
yextend extends Yara's functionality by automatically handling archived and compressed content inflation, enabling pattern matching on files buried within multiple layers of archives.
An open source tool that generates YARA rules from installed software on running operating systems for efficient software identification in digital forensic investigations.
A collection of YARA rules designed to identify files containing sensitive information such as usernames, passwords, and credit card numbers for penetration testing and forensic analysis.
FSF is a modular, recursive file scanning solution that enables analysts to extend the utility of Yara signatures and define actionable intelligence within a file.
A command-line string extraction utility for digital forensics that supports ASCII and Unicode string extraction from files and directories with pattern matching and filtering capabilities.
Exiv2 is a C++ library and command-line utility for reading, writing, deleting, and modifying Exif, IPTC, XMP, and ICC metadata in image files.
A Yara ruleset designed to detect PHP shells and other webserver malware for malware analysis and threat detection.
Common questions security professionals ask when evaluating alternatives and competitors to libsmraw.
The most popular alternatives to libsmraw include HexPrism, cabextract, libolecf, wxHexEditor, and ArtifactExtractor. These Digital Forensics and Incident Response tools offer similar capabilities and are frequently compared by security professionals evaluating their options.