ics_mem_collect Logo

ics_mem_collect

0
Free
Visit Website

For many industrial control system devices, there is not a simple solution for programmatically accessing memory. Without an API, an incident responder or digital forensics analyst may be required to manually probe memory looking for anomalies or malicious activity. This project is intended to develop APIs that allow an analyst to adapt pre-existing tools or rapidly build new tools in order to target these devices. Current Devices: GE D20MX Future Work: JTAG Interface

FEATURES

ALTERNATIVES

A library for working with Windows NT data types, providing access and manipulation functions.

Accessing databases stored on a machine by the Chrome browser and dumping URLs found.

iOS Mobile Backup Xtractor tool for extracting iOS backups.

A command-line tool for searching and extracting strings from files with various options like ASCII and Unicode string search.

Fridump is an open source memory dumping tool using the Frida framework for dumping memory addresses from various platforms.

A reconnaissance tool for GitHub organizations

A console program for file recovery through data carving.

DFIR ORC Documentation provides detailed instructions for setting up the build environment and deploying the tool.