Digital Forensics
Tools and methodologies for investigating digital incidents and gathering electronic evidence.
Explore 211 curated tools and resources
RELATED TASKS
LATEST ADDITIONS
A forensic analysis tool that extracts and parses logs, notifications, and system information from iOS/iPadOS devices and backups.
A network forensics toolkit that transforms network traffic data into graph-based representations for interactive analysis and visualization through a web interface.
A binary analysis platform for analyzing binary programs
A powerful reverse engineering framework
A reverse engineering framework with a focus on usability and code cleanliness
A tool that uses graph theory to reveal hidden relationships and attack paths in an Active Directory environment.
A tool for discovering, analyzing, and remedying sensitive data
A comprehensive Linux log analysis tool that streamlines the investigation of security incidents by extracting and organizing critical details from supported log files.
A next-generation crawling and spidering framework for extracting data from websites
A script to extract subdomains/emails for a given domain using SSL/TLS certificate dataset on Censys.
A tool for collecting and analyzing screenshots from remote desktop protocols, web applications, and VNC connections.
A repository containing material from a talk on sub-domain enumeration techniques
PINNED

InfoSecHired
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Kriptos
An AI-driven data classification and governance platform that automatically discovers, analyzes, and labels sensitive information while providing risk management and compliance capabilities.

System Two Security
An AI-powered platform that automates threat hunting and analysis by processing cyber threat intelligence and generating customized hunt packages for SOC teams.

Aikido Security
Aikido is an all-in-one security platform that combines multiple security scanning and management functions for cloud-native applications and infrastructure.

Permiso
Permiso is an Identity Threat Detection and Response platform that provides comprehensive visibility and protection for identities across multiple cloud environments.

Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.