Docker Forensics Toolkit Logo

Docker Forensics Toolkit

0
Free
Visit Website

This toolkit allows for post-mortem analysis of Docker runtime environments using forensic HDD copies of the docker host system. Features include mounting forensic images, displaying status information, listing images and containers, showing image history and configuration, displaying container logs, mounting container file systems, and extracting file system metadata for creating timelines.

FEATURES

ALTERNATIVES

Turbinia is an open-source framework for automating the running of common forensic processing tools to help with processing evidence in the Cloud.

A suite of console tools for working with timestamps in Windows with 100-nanosecond precision.

A cybersecurity tool for collecting and analyzing forensic artifacts on live systems.

A tool for fixing acquired .evt Windows Event Log files in digital forensics.

A library and tools to access and analyze APFS file systems

A forensics tool for tracking USB device artifacts on Linux machines.

Developing APIs to access memory on industrial control system devices.

Hoarder is a tool to collect and parse windows artifacts.

PINNED