hashlookup-forensic-analyser Logo

hashlookup-forensic-analyser

0
Free
Visit Website

Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service or the Bloom filter from CIRCL hashlookup. This tool can help a digital forensic investigator to know the context, origin of specific files during a digital forensic investigation. The project is a component of the hashlookup.io project. Usage: hashlookup-analyser.py [-h] [-v] [--extended-debug] [--progress] [--disable-progress] [-d DIR] [--report] [--live-linux] [--print-all] [--print-unknown] [--include-stats] [--format FORMAT] [--cache] [--bloomfilters BLOOMFILTERS [BLOOMFILTERS ...]] [--bloomfilter-algorithm BLOOMFILTER_ALGORITHM] [--bloomfilters-lower-case] Analyse a forensic target to find and report files found and not found in hashlookup CIRCL public service. Optional arguments: -h, --help show this help message and exit -v, --verbose Verbose output. --extended-debug Debug file processed along with the mode and type. --progress Print progress of the file lookup on stderr. --disable-progress Disable printing progress of the file lookup on stderr. -d DIR, --dir DIR Directory to analyse. --report Generate a report

FEATURES

ALTERNATIVES

A framework for orchestrating forensic collection, processing, and data export.

A reconnaissance tool for GitHub organizations

A command-line utility for extracting human-readable text from binary files.

Developing APIs to access memory on industrial control system devices.

Exiv2 is a C++ library and command-line utility for image metadata manipulation.

Orochi is a collaborative forensic memory dump analysis framework.

A high-performance digital forensics exploitation tool for extracting structured information from various inputs without parsing file system structures.

ID-spoofing NFS client

PINNED