ForensicMiner v1.4 Logo

ForensicMiner v1.4

0
Free
Updated 11 March 2025
Visit Website

ForensicMiner, a PowerShell-based DFIR automation tool, revolutionizes the field of digital investigations. Designed for efficiency, it automates artifact and evidence collection from Windows machines. Compatibility with Flacon Crowdstrike RTR and Palo Alto Cortex XDR Live Terminal, along with its swift performance and user-friendly interface, makes ForensicMiner an indispensable asset for investigators navigating the complexities of forensic analysis. Streamlined and effective, this tool sets a new standard in the realm of digital forensics. How To Install ? Know This Before Installation - Always install ForensicMiner on 'C:' drive. - Always run ForensicMiner as administrator, if not, some things may not work properly. - Don't run the tool using Windows PowerShell (x86)! if you do, some things may not work properly. - Make sure your PowerShell Execution Policy is on Bypass, if not, scripts could not run on your system. Installation Process - Text Guide In this GitHub repository, click on '<> Code,' and t

FEATURES

SIMILAR TOOLS

A library to access and parse Windows XML Event Log (EVTX) format, useful for digital forensics and incident response.

A library and set of tools for accessing and analyzing storage media devices and partitions for forensic analysis and investigation.

A command line utility for managing volume shadow copies with capabilities for evasion, persistence, and file extraction.

A collaborative forensic timeline analysis tool for organizing and analyzing data with rich annotations and comments.

Tool for live forensics acquisition on Windows systems, collecting artefacts for early compromise detection.

Diffy is a digital forensics and incident response (DFIR) tool developed by Netflix's Security Intelligence and Response Team (SIRT) for scoping compromises across cloud instances.

Python script to parse macOS MRU plist files into human-friendly format

A digital artifact extraction framework for extracting data from volatile memory (RAM) samples, providing visibility into the runtime state of a system.

Accessing databases stored on a machine by the Chrome browser and dumping URLs found.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved