ForensicMiner v1.4 Logo

ForensicMiner v1.4

0
Free
Visit Website

ForensicMiner, a PowerShell-based DFIR automation tool, revolutionizes the field of digital investigations. Designed for efficiency, it automates artifact and evidence collection from Windows machines. Compatibility with Flacon Crowdstrike RTR and Palo Alto Cortex XDR Live Terminal, along with its swift performance and user-friendly interface, makes ForensicMiner an indispensable asset for investigators navigating the complexities of forensic analysis. Streamlined and effective, this tool sets a new standard in the realm of digital forensics. How To Install ? Know This Before Installation - Always install ForensicMiner on 'C:' drive. - Always run ForensicMiner as administrator, if not, some things may not work properly. - Don't run the tool using Windows PowerShell (x86)! if you do, some things may not work properly. - Make sure your PowerShell Execution Policy is on Bypass, if not, scripts could not run on your system. Installation Process - Text Guide In this GitHub repository, click on '<> Code,' and t

FEATURES

ALTERNATIVES

A powerful tool for analyzing and visualizing system activity timelines.

OSXCollector is a forensic evidence collection & analysis toolkit for OSX.

Python forensic tool for extracting and analyzing information from Firefox, Iceweasel, and Seamonkey browsers.

A tool for fixing acquired .evt Windows Event Log files in digital forensics.

Forensics tool for exploring offline Docker filesystems.

Accessing databases stored on a machine by the Chrome browser and dumping URLs found.

A tool that uses graph theory to reveal hidden relationships and attack paths in an Active Directory environment.

A forensic tool to find hidden processes and TCP/UDP ports by rootkits or other hidden techniques.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved