Accessing databases stored on a machine by the Chrome browser and dumping URLs found. Getting Started: These instructions will help you set up the project on your local machine for development and testing purposes. Prerequisites: Python 2.7 is required. Installing: Run 'pip install -r requirements.txt' to install necessary packages. Check packages: - For Windows: 'pip list | Findstr /L "package"' - For Linux: 'pip list | grep "package"' Running the tests: - To kill Chrome processes for deeper analysis on Windows: 'python main.py -k -d' - To kill Chrome processes for deeper analysis on Linux: './main.py -k -d' Authors: Tomer Eyzenberg - Initial work - eLoopWoo
FEATURES
SIMILAR TOOLS
A command line utility for managing volume shadow copies with capabilities for evasion, persistence, and file extraction.
A comprehensive incident response tool for Windows computers, providing advanced memory forensics and access to locked systems.
WinSearchDBAnalyzer can parse and recover records in Windows.edb, providing detailed insights into various data types.
Dissect is a digital forensics & incident response framework that simplifies the analysis of forensic artefacts from various disk and file formats.
Magnet ACQUIRE offers robust data extraction capabilities for digital forensics investigations, supporting a wide range of devices.
Open Source computer forensics platform with modular design for easy automation and scripting.
A library and tools for accessing and analyzing Linux Logical Volume Manager (LVM) volume system format.
DFIR ORC Documentation provides detailed instructions for setting up the build environment and deploying the tool.
A command-line tool for extracting detailed information from JPEG files, including image dimensions, compression, and metadata.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.