Acquire, triage, and investigate remote evidence via portable iSCSI readonly access. The project is based on the work of TalAloni and Fujita, aiming to provide a command line, open-source tool for forensic acquisition and analysis scenarios.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A PowerShell-based incident response and live forensic data acquisition tool for Windows hosts.
A comprehensive incident response tool for Windows computers, providing advanced memory forensics and access to locked systems.
A command-line tool for creating hex dumps, converting between binary and human-readable representations, and patching binary files.
A library for read-only access to QEMU Copy-On-Write (QCOW) image files, supporting multiple versions and compression formats for digital forensics analysis.
A digital forensics tool that provides read-only access to file-system objects from various storage media types and file formats.
A library and set of tools for accessing and analyzing storage media devices and partitions for forensic analysis and investigation.
A library to access FileVault Drive Encryption (FVDE) encrypted volumes on Mac OS X systems.
A library to access and parse Windows XML Event Log (EVTX) format, useful for digital forensics and incident response.
A digital artifact extraction framework for extracting data from volatile memory (RAM) samples, providing visibility into the runtime state of a system.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.