File Extraction
Explore 11 curated tools and resources
LATEST ADDITIONS
A command line utility for managing volume shadow copies with capabilities for evasion, persistence, and file extraction.
A network forensics tool for visualizing packet captures as network diagrams with detailed analysis.
Free software for extracting Microsoft cabinet files, supporting all features and formats of Microsoft cabinet files and Windows CE installation files.
A tool for parsing and extracting information from the Master File Table of NTFS file systems.
Extract local data storage of an Android application in one click.
A high-performance digital forensics exploitation tool for extracting structured information from various inputs without parsing file system structures.
A script for extracting common Windows artifacts from source images and VSCs with detailed dependencies and usage instructions.
Web interface for the Volatility Memory Analysis framework with advanced features.
A tool for extracting files from packet capture files with ease of use and extensibility for Python developers.
Stegextract is a Bash script that extracts hidden files and strings from images, supporting PNG, JPG, and GIF formats.
A DFVFS backed viewer project with a WxPython GUI, aiming to enhance file extraction and viewing capabilities.
PINNED
Fabric Platform by BlackStork
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Mandos Brief Newsletter
Stay ahead in cybersecurity. Get the week's top cybersecurity news and insights in 8 minutes or less.
Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
Adversa AI
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.