A better strings utility! Command Line Interface bstrings version 1.5.1.0 Author: Eric Zimmerman (saericzimmerman@gmail.com) https://github.com/EricZimmerman/bstrings - If set, look for ASCII strings. Default is true. Use -a false to disable - Chunk size in MB. Valid range is 1 to 1024. Default is 512 - Directory to recursively process. Either this or -f is required - File to search. Either this or -d is required - Minimum string length. Default is 3 - File to save results to - Display list of built-in regular expressions - Quiet mode (Do not show header or total number of hits) - Really Quiet mode (Do not display hits to console. Speeds up processing when using -o) - If set, look for Unicode strings. Default is true. Use -u false to disable - Maximum string length. Default is unlimited - String to look for. When set, only matching strings are returned - Regex to look for. When set, only strings matching the regex are returned - File containing strings to look for. When set, only matching strings are returned - File containing regex patterns to look for. When set, only strings matching regex patterns are returned - Range of characters to search for in 'Code page' stri
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A collection of Mac OS X and iOS forensics resources with a focus on artifact collection and collaboration.
mac_apt is a versatile DFIR tool for processing Mac and iOS images, offering extensive artifact extraction capabilities and cross-platform support.
A forensic tool to find hidden processes and TCP/UDP ports by rootkits or other hidden techniques.
Tool for live forensics acquisition on Windows systems, collecting artefacts for early compromise detection.
Browse and analyze iPhone/iPad backups with detailed file properties and various viewers.
NBD is a userland implementation of the Network Block Device protocol, allowing for remote access to block devices over a network.
A command-line utility for extracting human-readable text from binary files.
Collects and organizes Linux OS data for detailed analysis and incident response.
Web interface for the Volatility Memory Forensics Framework
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.