AMExtractor is a tool that can dump out the physical content of an Android device without the need for kernel source code, using /dev/kmem to run code in kernel space. It has been tested on various devices like Galaxy Nexus, Nexus 4, Nexus 5, and Samsung Galaxy S4, providing an alternative to LKM based tools like LiME.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A digital artifact extraction framework for extracting data from volatile memory (RAM) samples, providing visibility into the runtime state of a system.
A Cross-Platform Forensic Framework for Google Chrome that allows investigation of history, downloads, bookmarks, cookies, and provides a full report.
A powerful OSINT tool for creating custom templates for data extraction and analysis
Exiv2 is a C++ library and command-line utility for image metadata manipulation.
mac_apt is a versatile DFIR tool for processing Mac and iOS images, offering extensive artifact extraction capabilities and cross-platform support.
Powerful tool for searching and hunting through Windows forensic artefacts with support for Sigma detection rules and custom Chainsaw detection rules.
XMLStarlet offers a suite of command line utilities for manipulating and querying XML documents.
Open source tool for generating YARA rules about installed software from a running OS.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.