Loading...
Digital Forensics and Incident Response (DFIR) tools for digital forensic analysis, evidence collection, malware analysis, and cyber incident investigation.
Browse 511 digital forensics and incident response tools
An open source format for storing digital evidence and data, with a C/C++ library for creating, reading, and manipulating AFF4 images.
A library to access FileVault Drive Encryption (FVDE) encrypted volumes on Mac OS X systems.
TestDisk is a free data recovery software that can recover lost partitions and undelete files from various file systems.
A digital archive of the internet, allowing users to capture and browse archived web pages.
A tool that extracts and deobfuscates strings from malware binaries using advanced static analysis techniques.
A free, fast, and flexible multi-platform IOC and YARA scanner for Windows, Linux, and macOS.
A library to access the Windows New Technology File System (NTFS) format with read-only support for NTFS versions 3.0 and 3.1.
Automated DFIR platform for rapid incident investigation and endpoint triage
A binary analysis and management framework for organizing and analyzing malware and exploit samples, and creating plugins.
A digital forensics tool that provides read-only access to file-system objects from various storage media types and file formats.
A library for accessing and parsing Windows NT Registry File (REGF) format files, designed for digital forensics and registry analysis applications.
Free software for extracting Microsoft cabinet files, supporting all features and formats of Microsoft cabinet files and Windows CE installation files.
A library for accessing and parsing Extensible Storage Engine (ESE) Database Files used by Microsoft applications like Windows Search, Exchange, and Active Directory for forensic analysis purposes.
CAPA is a static analysis tool that detects and reports capabilities in executable files across multiple formats, mapping findings to MITRE ATT&CK tactics and techniques.
Falcon Sandbox is a malware analysis framework that provides in-depth static and dynamic analysis of files, offering hybrid analysis, behavior indicators, and integrations with various security tools.
A library to access and manipulate RAW image files.
A library for accessing and parsing Microsoft Internet Explorer cache files (index.dat) to extract URLs, timestamps, and cached content for digital forensic analysis.
Unfurl is a URL analysis tool that extracts and visualizes data from URLs, breaking them down into components and presenting the information visually.
A comprehensive incident response tool for Windows computers, providing advanced memory forensics and access to locked systems.
A free endpoint security tool for host investigative capabilities to find signs of malicious activity through memory and file analysis.
A static analysis framework for extracting key characteristics from various file formats
In-depth threat intelligence reports and services providing insights into real-world intrusions, malware analysis, and threat briefs.
A library for read-only access to QEMU Copy-On-Write (QCOW) image files, supporting multiple versions and compression formats for digital forensics analysis.
A PowerShell-based incident response and live forensic data acquisition tool for Windows hosts.
Common questions about Digital Forensics and Incident Response tools, selection guides, pricing, and comparisons.
Essential DFIR tools include: disk imaging and analysis (for examining file systems, deleted files, and artifacts), memory forensics (analyzing RAM for malware, credentials, and running processes), network forensics (capturing and analyzing packet data), log analysis and timeline reconstruction, and malware analysis (static and dynamic analysis of malicious files). Many investigators also use cloud-specific forensics tools for AWS/Azure/GCP.
Based on user ratings and community engagement on CybersecTools, the top-rated Digital Forensics and Incident Response tools are:
Yes. Out of 24 digital forensics and incident response tools listed on CybersecTools, 23 are free and 1 are commercial. Free tools work well for small teams, testing, and budget-conscious organizations. Commercial tools typically add enterprise features, dedicated support, and SLA guarantees.