Loading...
Digital Forensics and Incident Response (DFIR) tools for digital forensic analysis, evidence collection, malware analysis, and cyber incident investigation.
Browse 511 digital forensics and incident response tools
DFIR platform automating investigation, evidence collection, and IR.
Digital forensics tools for detecting CSAM on devices and online platforms.
AI-native incident management platform with on-call, response & retrospectives.
AI-native DFIR platform cutting breach recovery time by 75% via automation.
Cybersecurity & digital forensics software for malware detection and DFIR.
Suite of data forensics, migration, backup, and cybersecurity tools/services.
OSINT tool for investigating cybercrime activity on Telegram.
AI-powered file analysis platform delivering malware verdicts in natural language.
OSINT tool for digital identity investigation across 600+ public sources.
OSINT-driven link analysis tool for mapping entity relationships visually.
Professional digital forensics services covering computers, mobile, and media.
FIM and config change monitoring tool with baseline deviation detection.
AI-powered data lake for structured/unstructured data discovery & analysis.
Inter-company CERT service offering DFIR & CTI for orgs of all sizes.
Professional digital forensics service covering breaches, fraud, and OSINT.
Email-focused digital forensics tool for evidence acquisition, analysis & reporting.
Decrypts S/MIME & OpenPGP emails from PST/OST/EDB for forensic analysis.
Forensic email analysis tool for detecting spam, phishing, and email threats.
Email forensics tool for analyzing MIME header fields across 20+ formats.
Windows-based email forensics tool for evidence recovery and analysis.
Email forensic tool for analyzing email headers, body, and attachments.
Agentic AI tool for automated malware reverse engineering & phishing analysis.
Plugin that decompiles malware PE files into readable C code using hybrid analysis.
Common questions about Digital Forensics and Incident Response tools, selection guides, pricing, and comparisons.
Essential DFIR tools include: disk imaging and analysis (for examining file systems, deleted files, and artifacts), memory forensics (analyzing RAM for malware, credentials, and running processes), network forensics (capturing and analyzing packet data), log analysis and timeline reconstruction, and malware analysis (static and dynamic analysis of malicious files). Many investigators also use cloud-specific forensics tools for AWS/Azure/GCP.