Orochi is an open source framework for collaborative forensic memory dump analysis. Using Orochi, you and your collaborators can easily organize your memory dumps and analyze them all at the same time. Orochi architecture uses Volatility 3, saves Volatility results in ElasticSearch, distributes loads among nodes using Dask, uses Django as frontend, uses Postgresql to save users and analysis metadata such as status and errors, uses MailHog to manage the users registration emails, and uses Redis for caching.
FEATURES
ALTERNATIVES
A Cross-Platform Forensic Framework for Google Chrome that allows investigation of history, downloads, bookmarks, cookies, and provides a full report.
A toolkit for forensic analysis of network appliances with YARA decoding options and frame extraction capabilities.
Malscan is a tool to scan process memory for YARA matches and execute Python scripts.
A comprehensive guide to incident response and computer forensics, covering the entire lifecycle of incident response and remediation.
An open source format for storing digital evidence and data, with a C/C++ library for creating, reading, and manipulating AFF4 images.
GVfs is a userspace virtual filesystem implementation for GIO with various backends and features.
PINNED

Mandos Brief Newsletter
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

PTJunior
An AI-powered penetration testing platform that autonomously discovers, exploits, and documents vulnerabilities while generating NIST-compliant reports.

CTIChef.com Detection Feeds
A tiered cyber threat intelligence service providing detection rules from public repositories with varying levels of analysis, processing, and guidance for security teams.

ImmuniWeb® Discovery
ImmuniWeb Discovery is an attack surface management platform that continuously monitors an organization's external digital assets for security vulnerabilities, misconfigurations, and threats across domains, applications, cloud resources, and the dark web.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.