Tool for parsing Android logs events and protobuf data
Accessing databases stored on a machine by the Chrome browser and dumping URLs found. Getting Started: These instructions will help you set up the project on your local machine for development and testing purposes. Prerequisites: Python 2.7 is required. Installing: Run 'pip install -r requirements.txt' to install necessary packages. Check packages: - For Windows: 'pip list | Findstr /L "package"' - For Linux: 'pip list | grep "package"' Running the tests: - To kill Chrome processes for deeper analysis on Windows: 'python main.py -k -d' - To kill Chrome processes for deeper analysis on Linux: './main.py -k -d' Authors: Tomer Eyzenberg - Initial work - eLoopWoo
Tool for parsing Android logs events and protobuf data
A user-friendly and fast Forensic Analysis tool with features like tagging files and generating preview reports.
Tool used for dumping memory from Android devices with root access requirement and forensic soundness considerations.
GUI-based memory forensic capture tool for cyber forensics and cyber crime investigation.
A tool that uses Plaso to parse forensic artifacts and disk images, creating custom reports for easier analysis.
A command-line utility and Python package for mounting and unmounting various disk image formats with support for different volume systems and filesystems.