Digital Forensics and Incident Response

Digital Forensics and Incident Response (DFIR) tools for digital forensic analysis, evidence collection, malware analysis, and cyber incident investigation.

Explore 494 curated cybersecurity tools, with 17,495+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Filter by:
yaramod Logo

Yaramod is a library for parsing YARA rules into AST and building new YARA rulesets with C++ programming interface.

0
Meerkat Logo

A collection of PowerShell modules for artifact gathering and reconnaissance of Windows-based endpoints.

0
RABCDAsm Logo

RABCDAsm is a collection of utilities for ActionScript 3 assembly/disassembly and SWF file manipulation.

0
imobax Logo

A command-line tool for extracting data from iOS mobile device backups created by iTunes on macOS systems.

0
timeliner Logo

Timeliner is a digital forensics tool that rewrites mactime with an advanced expression engine for complex timeline filtering using BPF syntax.

0
kube-forensics Logo

Create checkpoint snapshots of the state of running pods for later off-line analysis.

0
DFIRTrack Logo

DFIRTrack is an open source web application focused on incident response for handling major incidents with many affected systems, tracking system status, tasks, and artifacts.

0
jpeginfo Logo

A command-line tool that extracts detailed technical information, metadata, and checksums from JPEG image files with support for multiple output formats.

0
VolUtility Logo

Web interface for the Volatility Memory Analysis framework with advanced features.

0
Strelka Logo

Strelka is a real-time, container-based file scanning system that performs file extraction and metadata collection at enterprise scale for threat hunting, detection, and incident response.

0
Vim Syntax Highlighting for YARA Rules Logo

A Vim syntax-highlighting plugin for YARA rules that supports versions up to v4.3 and provides enhanced code readability for malware analysts.

0
Hoarder Logo

Hoarder is a tool to collect and parse windows artifacts.

0
a-ray-grass Logo

YARA module for supporting DCSO format bloom filters with hashlookup capabilities.

0
LiME Logo

LiME is a Linux Memory Extractor tool for acquiring volatile memory from Linux and Linux-based devices, including Android, with features like full memory captures and minimal process footprint.

0
Movfuscator-Be-Gone Logo

A de-obfuscator for M/o/Vfuscator, a notorious obfuscator, designed to reverse the effects of M/o/Vfuscator's obfuscation.

1
Explorer Suite Logo

A freeware suite of tools for PE editing and process viewing, including CFF Explorer and Resource Editor.

0
Procmon for Linux Logo

Procmon for Linux is a reimagining of the classic Procmon tool from Windows, allowing Linux developers to trace syscall activity efficiently.

0
CimSweep Logo

CimSweep is a suite of CIM/WMI-based tools for incident response and hunting operations on Windows systems without the need to deploy an agent.

0
The DFIR Report Logo

In-depth threat intelligence reports and services providing insights into real-world intrusions, malware analysis, and threat briefs.

0
nightHawk Response Logo

Custom built application for asynchronous forensic data presentation on an Elasticsearch backend, with upcoming features like Docker-based installation and new UI rewrite in React.

0
Yaraprocessor Logo

Yaraprocessor allows for scanning data streams in unique ways and dynamic scanning of payloads from network packet captures.

0
Chainsaw Logo

Powerful tool for searching and hunting through Windows forensic artefacts with support for Sigma detection rules and custom Chainsaw detection rules.

0
Hfinger Logo

Tool for fingerprinting malware HTTP requests.

0

Digital Forensics and Incident Response Tools - FAQ

Common questions about Digital Forensics and Incident Response tools including selection guides, pricing, and comparisons.

Digital Forensics and Incident Response (DFIR) tools for digital forensic analysis, evidence collection, malware analysis, and cyber incident investigation.

Have more questions? Browse our categories or search for specific tools.