pcapfex Logo

pcapfex

0
Free
Visit Website

Packet CAPture Forensic Evidence eXtractor (pcapfex) is a tool developed by Viktor Winkelmann as part of a bachelor thesis, designed to find and extract files from packet capture files. The tool's ease of use allows users to provide a pcap-file and receive a structured export of all files found in it, even if non-standard protocols were used. pcapfex offers a plugin-system for Python developers to easily add more file-types, encodings, or complex protocols. It is developed and tested for Linux environments, depends on Python 2.7 and the dpkt package, and optionally benefits from the regex package for better performance in multithreaded search for file objects.

FEATURES

ALTERNATIVES

Python tool for remote memory acquisition

Create checkpoint snapshots of the state of running pods for later off-line analysis.

An anti-forensic kill-switch tool for USB ports to shut down the computer immediately in case of unauthorized access.

A portable volatile memory acquisition tool for Linux.

A Cross-Platform Forensic Framework for Google Chrome that allows investigation of history, downloads, bookmarks, cookies, and provides a full report.

Fridump is an open source memory dumping tool using the Frida framework for dumping memory addresses from various platforms.

Windows anti-forensics USB monitoring tool with the ability to shutdown the computer upon detecting the unplugging of a specified USB device.

A library and tools to access and manipulate VMware Virtual Disk (VMDK) files.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved