IPED is an open source software implemented in Java by digital forensic experts from the Brazilian Federal Police since 2012, offering command line data processing, multiplatform support, portable cases, an intuitive analysis interface, high multithread performance, and support for large cases. It uses the Sleuthkit Library to decode disk images and file systems, supporting RAW/DD, E01, and ISO9660 image formats.
A command-line tool for searching and extracting strings from files with various options like ASCII and Unicode string search.
A library and set of tools for accessing and analyzing storage media devices and partitions for forensic analysis and investigation.
Easy-to-use live forensics toolbox for Linux endpoints with various capabilities such as process inspection, memory analysis, and YARA scanning.
Open Backup Extractor is an open source program for extracting data from iPhone and iPad backups.
A shell script for basic forensic collection of various artefacts from UNIX systems.
WinSearchDBAnalyzer can parse and recover records in Windows.edb, providing detailed insights into various data types.
LiME is a Linux Memory Extractor tool for acquiring volatile memory from Linux and Linux-based devices, including Android, with features like full memory captures and minimal process footprint.
A framework for orchestrating forensic collection, processing, and data export.
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Stay ahead in cybersecurity. Get the week's top cybersecurity news and insights in 8 minutes or less.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.