Digital Forensics

Explore 206 curated cybersecurity tools, with 16,024+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Filter by:
ManageEngine EventLog Analyzer Logo

Collects, analyzes, and monitors event logs to detect security threats

0
Rapid7 Threat Command Logo

A digital risk protection platform that monitors deep, and dark web environments

0
Black Kilt Security Consulting Services Logo

Black Kilt Security is a cybersecurity consulting firm that provides strategic planning, technology integration, compliance consulting, security engineering, and cyber forensics services to organizations of various sizes.

0
Silo for Research Logo

A web isolation platform that enables secure, anonymous digital investigations across the surface, deep, and dark web while protecting users from malware and preventing identity exposure.

0
Logpoint SIEM Logo

A security information and event management solution that collects, normalizes, and analyzes log data from across an organization's infrastructure to enhance threat detection and compliance reporting.

0
AKATI Sekurity Security Consulting Services Logo

AKATI Sekurity is a global cybersecurity consulting firm providing managed security services, governance and compliance, security consulting, and digital forensics and incident response across multiple industries.

1
DeTCT Logo

DeTCT is a digital risk discovery and protection platform that monitors attack surfaces, vulnerabilities, data leaks, brand impersonation, and third-party risks to help organizations manage their cyber risk posture.

0
iLEAPP Logo

A forensic analysis tool that extracts and parses logs, notifications, and system information from iOS/iPadOS devices and backups.

0
Granef Logo

A network forensics toolkit that transforms network traffic data into graph-based representations for interactive analysis and visualization through a web interface.

0
Radare2 Logo

A powerful reverse engineering framework

1
MasterParser Logo

A comprehensive Linux log analysis tool that streamlines the investigation of security incidents by extracting and organizing critical details from supported log files.

0
WavSteg Logo

A C-based steganographic tool that hides files within WAV audio files using least significant bit encoding techniques.

0
DFTimewolf Logo

A framework for orchestrating forensic collection, processing, and data export.

0
ssm-acquire Logo

A Python module for orchestrating remote forensic data acquisition and analysis from Linux instances using Amazon SSM.

0
dcfldd Logo

A modified version of GNU dd with added features like hashing and fast disk wiping.

0
AWS Incident Response Investigation of API activity using Athena and notification of actions using EventBridge Logo

An AWS incident response framework that uses Athena to analyze CloudTrail events and EventBridge for notifications to investigate API activity and detect security misconfigurations.

0
ALEAPP Android Logs Events And Protobuf Parser Logo

ALEAPP is a Python-based forensic tool for parsing Android logs, events, and protobuf data with both CLI and GUI interfaces.

0
Orochi Logo

Orochi is a collaborative forensic memory dump analysis framework.

0
RegRippy Logo

RegRippy is a modern Python 3 alternative to RegRipper for extracting data from Windows registry hives.

0
mac_apt Logo

mac_apt is a versatile DFIR tool for processing Mac and iOS images, offering extensive artifact extraction capabilities and cross-platform support.

0
Belkasoft Logo

Belkasoft offers cybersecurity solutions, training, and tools for businesses, law enforcement, and academia.

0
Android Application Analyzer Logo

A comprehensive Android application analysis tool that provides device management, logcat analysis, file examination, and integration with security frameworks like MobSF and JD-GUI.

0
Rekall Logo

Rekall is a discontinued project that aimed to improve memory analysis methodology but faced challenges due to the nature of in-memory structure and increasing security measures.

0
CDQR - Cold Disk Quick Response Logo

A tool that uses Plaso to parse forensic artifacts and disk images, creating custom reports for easier analysis.

0