ics_mem_collect Logo

ics_mem_collect

0
Free
Visit Website

For many industrial control system devices, there is not a simple solution for programmatically accessing memory. Without an API, an incident responder or digital forensics analyst may be required to manually probe memory looking for anomalies or malicious activity. This project is intended to develop APIs that allow an analyst to adapt pre-existing tools or rapidly build new tools in order to target these devices. Current Devices: GE D20MX Future Work: JTAG Interface

FEATURES

ALTERNATIVES

A tool for discovering, analyzing, and remedying sensitive data

A toolkit for forensic analysis of network appliances with YARA decoding options and frame extraction capabilities.

An open source format for storing digital evidence and data, with a C/C++ library for creating, reading, and manipulating AFF4 images.

Fridump is an open source memory dumping tool using the Frida framework for dumping memory addresses from various platforms.

A tool that uses graph theory to reveal hidden relationships and attack paths in an Active Directory environment.

A binary analysis platform for analyzing binary programs

A comprehensive incident response tool for Windows computers, providing advanced memory forensics and access to locked systems.

OSXCollector is a forensic evidence collection & analysis toolkit for OSX.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved