Docker Forensics Toolkit Logo

Docker Forensics Toolkit

0
Free
Visit Website

This toolkit allows for post-mortem analysis of Docker runtime environments using forensic HDD copies of the docker host system. Features include mounting forensic images, displaying status information, listing images and containers, showing image history and configuration, displaying container logs, mounting container file systems, and extracting file system metadata for creating timelines.

FEATURES

ALTERNATIVES

Python tool for remote memory acquisition

Stegextract is a Bash script that extracts hidden files and strings from images, supporting PNG, JPG, and GIF formats.

DFIR ORC Documentation provides detailed instructions for setting up the build environment and deploying the tool.

Autopsy is a GUI-based digital forensics platform for analyzing hard drives and smart phones, with a plug-in architecture for custom modules.

LiME is a Linux Memory Extractor tool for acquiring volatile memory from Linux and Linux-based devices, including Android, with features like full memory captures and minimal process footprint.

Python forensic tool for extracting and analyzing information from Firefox, Iceweasel, and Seamonkey browsers.

A recognition framework for identifying products, services, operating systems, and hardware by matching fingerprints against network probes.

A python module for orchestrating content acquisitions and analysis via Amazon SSM.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved