Acquire, triage, and investigate remote evidence via portable iSCSI readonly access. The project is based on the work of TalAloni and Fujita, aiming to provide a command line, open-source tool for forensic acquisition and analysis scenarios.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A digital artifact extraction framework for extracting data from volatile memory (RAM) samples, providing visibility into the runtime state of a system.
A library to access the Windows New Technology File System (NTFS) format with read-only support for NTFS versions 3.0 and 3.1.
A library and set of tools for accessing and analyzing storage media devices and partitions for forensic analysis and investigation.
A command-line tool for creating hex dumps, converting between binary and human-readable representations, and patching binary files.
Stegextract is a Bash script that extracts hidden files and strings from images, supporting PNG, JPG, and GIF formats.
A library to access FileVault Drive Encryption (FVDE) encrypted volumes on Mac OS X systems.
A comprehensive incident response tool for Windows computers, providing advanced memory forensics and access to locked systems.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.