CyLR Logo

CyLR

0
Free
Visit Website

The CyLR tool collects forensic artifacts from hosts with NTFS file systems quickly, securely, and minimizes impact to the host. It offers quick collection, raw file collection without using Windows API, collection of key artifacts by default, ability to specify custom targets, acquisition of special and in-use files, glob and regular expression patterns for custom targets, data collection into a zip file with customizable settings, and the option to specify a SFTP destination for the file archive. CyLR uses .NET Core and runs natively on Windows, Linux, and MacOS.

FEATURES

ALTERNATIVES

Python script to parse macOS MRU plist files into human-friendly format

A comprehensive incident response tool for Windows computers, providing advanced memory forensics and access to locked systems.

A Mac OS X forensic utility for ensuring correct forensic procedures during disk imaging.

Powerful tool for searching and hunting through Windows forensic artefacts with support for Sigma detection rules and custom Chainsaw detection rules.

A Python-based engine for automatic creation of timelines in digital forensic analysis

A powerful OSINT tool for creating custom templates for data extraction and analysis

NBD is a userland implementation of the Network Block Device protocol, allowing for remote access to block devices over a network.

A library to access the Extensible Storage Engine (ESE) Database File (EDB) format used in various Windows applications.

PINNED