The Sleuth Kit is a collection of command line tools and a C library that allows you to analyze disk images and recover files from them. Autopsy is an easy to use, GUI-based program that allows you to efficiently analyze hard drives and smart phones, with a plug-in architecture for add-on modules in Java or Python.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A command-line tool for creating hex dumps, converting between binary and human-readable representations, and patching binary files.
A library to access FileVault Drive Encryption (FVDE) encrypted volumes on Mac OS X systems.
A library for accessing and parsing Extensible Storage Engine (ESE) Database Files used by Microsoft applications like Windows Search, Exchange, and Active Directory for forensic analysis purposes.
A comprehensive incident response tool for Windows computers, providing advanced memory forensics and access to locked systems.
A library for accessing and parsing Microsoft Internet Explorer cache files (index.dat) to extract URLs, timestamps, and cached content for digital forensic analysis.
A PowerShell-based incident response and live forensic data acquisition tool for Windows hosts.
TestDisk is a free data recovery software that can recover lost partitions and undelete files from various file systems.
A library to access and parse Windows XML Event Log (EVTX) format, useful for digital forensics and incident response.
A library for accessing and parsing Windows NT Registry File (REGF) format files, designed for digital forensics and registry analysis applications.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.