kube-forensics Logo

kube-forensics

0
Free
Visit Website

kube-forensics allows a cluster administrator to create checkpoint snapshots of the state of running pods for later off-line analysis by dumping the current state of a running pod and all its containers, enabling security professionals to perform detailed forensic analysis in the event of a security breach.

FEATURES

ALTERNATIVES

iOSForensic is a Python tool for forensic analysis on iOS devices, extracting files, logs, SQLite3 databases, and .plist files into XML.

Open Source computer forensics platform with modular design for easy automation and scripting.

Recreates the File/Directory tree structure from an extracted $MFT file with detailed record mapping and analysis capabilities.

A forensic research tool for gathering forensic traces on Android and iOS devices, supporting the use of public indicators of compromise.

A modified version of GNU dd with added features like hashing and fast disk wiping.

Tool used for dumping memory from Android devices with root access requirement and forensic soundness considerations.

A forensic analysis tool that extracts and parses logs, notifications, and system information from iOS/iPadOS devices and backups.

Forensics tool for exploring offline Docker filesystems.

PINNED