Digital Forensics for File Analysis
Tools and methodologies for investigating digital incidents and gathering electronic evidence. Task: File Analysis
Explore 51 curated tools and resources
RELATED TASKS
LATEST ADDITIONS
A forensic analysis tool that extracts and parses logs, notifications, and system information from iOS/iPadOS devices and backups.
A collection of tools for extracting and analyzing information from .git repositories
A modified version of GNU dd with added features like hashing and fast disk wiping.
A tool for triaging crash files with various output formats and debugging engine options.
Comprehensive suite for advanced file analysis and software supply chain security.
Online platform for image steganography analysis
A command-line tool for creating hex dumps, converting between binary and human-readable representations, and patching binary files.
Python script to parse the NTFS USN Change Journal.
A forensics tool for tracking USB device artifacts on Linux machines.
A library to access and parse Windows NT Registry File (REGF) format.
A file search and query tool for ops and security experts.
Visually inspect regex matches in binary data/text with YARA and regular expressions, displaying matched bytes and surrounding context.
Exiv2 is a C++ library and command-line utility for image metadata manipulation.
A portable volatile memory acquisition tool for Linux.
PINNED

InfoSecHired
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Kriptos
An AI-driven data classification and governance platform that automatically discovers, analyzes, and labels sensitive information while providing risk management and compliance capabilities.

System Two Security
An AI-powered platform that automates threat hunting and analysis by processing cyber threat intelligence and generating customized hunt packages for SOC teams.

Aikido Security
Aikido is an all-in-one security platform that combines multiple security scanning and management functions for cloud-native applications and infrastructure.

Permiso
Permiso is an Identity Threat Detection and Response platform that provides comprehensive visibility and protection for identities across multiple cloud environments.

Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.