This project provides documentation accompanying Digital Forensics Artifact Repository. Scripts and Digital Forensics Artifact knowledge base (artifactsrc) are intended to help maintain the knowledge base. If you want to contribute a description of an artifact definition, please use the Template. The goal is to describe artifacts, not to provide a repository of tools. Contact forensicartifacts@googlegroups.com for more information.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A library to access FileVault Drive Encryption (FVDE) encrypted volumes on Mac OS X systems.
A library for accessing and parsing Extensible Storage Engine (ESE) Database Files used by Microsoft applications like Windows Search, Exchange, and Active Directory for forensic analysis purposes.
A comprehensive incident response tool for Windows computers, providing advanced memory forensics and access to locked systems.
A library for accessing and parsing Microsoft Internet Explorer cache files (index.dat) to extract URLs, timestamps, and cached content for digital forensic analysis.
Stegextract is a Bash script that extracts hidden files and strings from images, supporting PNG, JPG, and GIF formats.
A library and set of tools for accessing and analyzing storage media devices and partitions for forensic analysis and investigation.
A library for read-only access to QEMU Copy-On-Write (QCOW) image files, supporting multiple versions and compression formats for digital forensics analysis.
A library to access the Windows New Technology File System (NTFS) format with read-only support for NTFS versions 3.0 and 3.1.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.