AMExtractor Logo

AMExtractor

0
Free
Updated 11 March 2025
Visit Website

AMExtractor is a tool that can dump out the physical content of an Android device without the need for kernel source code, using /dev/kmem to run code in kernel space. It has been tested on various devices like Galaxy Nexus, Nexus 4, Nexus 5, and Samsung Galaxy S4, providing an alternative to LKM based tools like LiME.

FEATURES

SIMILAR TOOLS

A digital artifact extraction framework for extracting data from volatile memory (RAM) samples, providing visibility into the runtime state of a system.

A Cross-Platform Forensic Framework for Google Chrome that allows investigation of history, downloads, bookmarks, cookies, and provides a full report.

Open source Python library for NTFS analysis

A powerful OSINT tool for creating custom templates for data extraction and analysis

Exiv2 is a C++ library and command-line utility for image metadata manipulation.

mac_apt is a versatile DFIR tool for processing Mac and iOS images, offering extensive artifact extraction capabilities and cross-platform support.

Powerful tool for searching and hunting through Windows forensic artefacts with support for Sigma detection rules and custom Chainsaw detection rules.

XMLStarlet offers a suite of command line utilities for manipulating and querying XML documents.

Open source tool for generating YARA rules about installed software from a running OS.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

Copyright © 2025 - All rights reserved