Docker Forensics Toolkit Logo

Docker Forensics Toolkit

0
Free
Updated 11 March 2025
Visit Website

This toolkit allows for post-mortem analysis of Docker runtime environments using forensic HDD copies of the docker host system. Features include mounting forensic images, displaying status information, listing images and containers, showing image history and configuration, displaying container logs, mounting container file systems, and extracting file system metadata for creating timelines.

FEATURES

SIMILAR TOOLS

Stegextract is a Bash script that extracts hidden files and strings from images, supporting PNG, JPG, and GIF formats.

A digital investigation platform for parsing, searching, and visualizing evidences with advanced analytics capabilities.

Autopsy is a GUI-based digital forensics platform for analyzing hard drives and smart phones, with a plug-in architecture for custom modules.

A tool that uses graph theory to reveal hidden relationships and attack paths in an Active Directory environment.

Turbinia is an open-source framework for automating the running of common forensic processing tools to help with processing evidence in the Cloud.

A reverse engineering tool that extracts and organizes Samsung ODIN3 protocol messages from USB packet captures into human-readable files.

Customizable live OS constructor tool for remote forensics and incident response.

Highlighter is a FireEye Market app that integrates with FireEye products to provide enhanced cybersecurity capabilities.

Developing APIs to access memory on industrial control system devices.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved