Foremost is a console program used for data recovery by analyzing headers, footers, and internal data structures, commonly known as data carving. It can operate on image files or directly on a drive, with the ability to specify headers and footers through a configuration file or command line switches. Originally developed by the United States Air Force, Foremost is now available to the public.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A network forensics toolkit that transforms network traffic data into graph-based representations for interactive analysis and visualization through a web interface.
Collects and organizes Linux OS data for detailed analysis and incident response.
A collection of tools for extracting and analyzing information from .git repositories
Dissect is a digital forensics & incident response framework that simplifies the analysis of forensic artefacts from various disk and file formats.
Recreates the File/Directory tree structure from an extracted $MFT file with detailed record mapping and analysis capabilities.
Highlighter is a FireEye Market app that integrates with FireEye products to provide enhanced cybersecurity capabilities.
iOSForensic is a Python tool for forensic analysis on iOS devices, extracting files, logs, SQLite3 databases, and .plist files into XML.
A library for working with Windows NT data types, providing access and manipulation functions.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.