pcapfex Logo

pcapfex

0
Free
Visit Website

Packet CAPture Forensic Evidence eXtractor (pcapfex) is a tool developed by Viktor Winkelmann as part of a bachelor thesis, designed to find and extract files from packet capture files. The tool's ease of use allows users to provide a pcap-file and receive a structured export of all files found in it, even if non-standard protocols were used. pcapfex offers a plugin-system for Python developers to easily add more file-types, encodings, or complex protocols. It is developed and tested for Linux environments, depends on Python 2.7 and the dpkt package, and optionally benefits from the regex package for better performance in multithreaded search for file objects.

FEATURES

ALTERNATIVES

Python tool for remotely or locally dumping RAM of a Linux client for digital forensics analysis.

OSINTLeak is a tool for discovering and analyzing leaked sensitive information across various online sources to identify potential security risks.

iOSForensic is a Python tool for forensic analysis on iOS devices, extracting files, logs, SQLite3 databases, and .plist files into XML.

Anti-forensics tool for Red Teamers to erase footprints and test incident response capabilities.

A script to assist in creating templates for VirtualBox to enhance VM detection evasion.

A software utility with forensic tools for smartphones, offering powerful data extraction and decoding capabilities.

A library to access and parse Windows XML Event Log (EVTX) format, useful for digital forensics and incident response.

Windows anti-forensics USB monitoring tool with the ability to shutdown the computer upon detecting the unplugging of a specified USB device.

PINNED