The Network Appliance Forensic Toolkit is a set of tools designed to assist in the forensic analysis of network appliances, with capabilities such as using YARA with decoding options like decoder_add1, decoder_rol1, and decoder_xor1, as well as features for extracting frames from memory to PCAP files.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A Mac OS X forensic utility for ensuring correct forensic procedures during disk imaging.
A tool that uses Plaso to parse forensic artifacts and disk images, creating custom reports for easier analysis.
wxHexEditor is a free hex editor / disk editor with various data manipulation operations and visualization functionalities.
A tool for analyzing pentest screenshots using a convolutional neural network
A forensic research tool for gathering forensic traces on Android and iOS devices, supporting the use of public indicators of compromise.
DFIR ORC Documentation provides detailed instructions for setting up the build environment and deploying the tool.
iOSForensic is a Python tool for forensic analysis on iOS devices, extracting files, logs, SQLite3 databases, and .plist files into XML.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.