Skip to content

A curated list of essential digital forensics tools used for investigation, data recovery, and security analysis. These tools help in disk forensics, memory analysis, network monitoring, malware analysis, and more.

License

Notifications You must be signed in to change notification settings

yogsec/Digital-Forensics-Tools

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

18 Commits
 
 
 
 
 
 

Repository files navigation

🕵️‍♂️ Digital Forensics Tools

Digital Forensics TOols

A curated list of essential digital forensics tools used for investigation, data recovery, and security analysis. These tools help in disk forensics, memory analysis, network monitoring, malware analysis, and more.

🛠 Disk Forensics Tools

🔍 Disk Imaging & Cloning

  • Autopsy – GUI-based forensic tool for disk analysis.
  • The Sleuth Kit (TSK) – Command-line toolkit for file system forensics.
  • FTK Imager – Disk imaging and evidence collection.
  • dd (Data Dump) – CLI tool for disk cloning and imaging.
  • dcfldd – Enhanced version of dd for forensics.
  • Guymager – Fast forensic imaging tool with a GUI.

🗂 File System & Partition Analysis

🔎 Metadata & Hash Analysis

🧩 File Recovery & Carving

  • Foremost – Recover deleted files based on headers, footers, and data structures.
  • Scalpel – File carving tool for deleted file recovery.
  • Recuva – User-friendly file recovery software.

🔥 Live Disk Analysis


🧠 Memory Forensics Tools

🔍 Memory Dumping Tools

  • DumpIt – One-click RAM dumping tool for Windows.
  • WinPmem – Windows memory acquisition tool.
  • LiME – Extracts live memory from Linux systems.
  • AVML – Memory acquisition for Linux & Azure VMs.
  • OSForensics – RAM imaging and forensic analysis.

🔬 Memory Analysis Tools

  • Volatility – Open-source framework for memory analysis.
  • Volatility 3 – Python 3-based version with enhanced support.
  • Rekall – Memory forensic framework from Google.
  • MemProcFS – Mounts memory dumps as a virtual file system.
  • Redline – Analyzes memory for malware infections.

🦠 Malware & Process Analysis

  • Malfind – Detects malicious code injections.
  • YARA – Signature-based malware detection in RAM.
  • Strings – Extracts readable text from memory dumps.
  • PE-sieve – Detects injected malicious code.
  • HollowsHunter – Identifies process hollowing and malware injections.

📊 Memory Timeline & Log Analysis

  • Log2Timeline (Plaso) – Creates forensic timelines from memory artifacts.
  • Memtriage – Rapid triage tool for incident response.
  • Efilter – Query and analyze memory artifacts efficiently.

🌐 Network Forensics Tools

🔎 Packet Sniffers & Traffic Analysis

  • Wireshark – GUI-based packet analyzer for real-time network traffic analysis.
  • tcpdump – Command-line packet sniffer for capturing network packets.
  • TShark – CLI version of Wireshark for automated packet analysis.

🕵️ Intrusion Detection & Network Security Monitoring

  • Zeek (Bro) – Network traffic analysis tool for security monitoring.
  • Suricata – High-performance network IDS, IPS, and NSM tool.
  • Snort – Open-source intrusion detection and prevention system (IDS/IPS).

🛠️ Log Analysis & Network Flow Monitoring

🔓 Deep Packet Inspection & Protocol Analysis

  • NetworkMiner – Passive network traffic analyzer for extracting forensic data.
  • Xplico – Network forensic tool for reconstructing network sessions.
  • NetFlow Analyzer – Monitors and analyzes network traffic using NetFlow data.

📡 Wireless Network Forensics

  • Kismet – Wireless network sniffer and intrusion detection tool.
  • Aircrack-ng – Wi-Fi network security assessment and packet capturing.
  • WiFi Pineapple – Wireless network penetration testing and monitoring.

🖥️ Man-in-the-Middle (MitM) & Traffic Manipulation

  • ettercap – MitM attack tool for sniffing and network manipulation.
  • MITMf – Advanced framework for network traffic interception and manipulation.
  • Bettercap – Swiss army knife for network forensics, pentesting, and MitM attacks.

🏴‍☠️ Darknet & Deep Web Analysis

  • Tor – Anonymity network used for deep web forensics.
  • ONIONScan – Deep web analysis and onion service scanning.

📱 Mobile Forensics Tools

🔍 Mobile Data Extraction & Analysis

🔧 Android Forensics

  • ADB (Android Debug Bridge) – Command-line tool for interacting with Android devices.
  • Andriller – Android pattern lock cracker and data extraction.
  • AFLogical – Open-source tool for logical data extraction from Android.
  • Frida – Dynamic instrumentation tool for Android reverse engineering.
  • Drozer – Security testing framework for Android apps.
  • Apktool – Reverse engineer APK files.

🍏 iOS Forensics

🌐 Cloud & Online Data Extraction

📶 SIM & IMEI Forensics

🔍 Mobile App & Messaging Analysis


🦠 Malware Forensics Tools

🔍 1. Static Analysis Tools

  • IDA Pro – Advanced disassembler and decompiler.
  • Ghidra – Open-source reverse engineering framework.
  • Radare2 – Binary analysis and reversing tool.
  • PEStudio – Analyzes Windows executables for malware indicators.
  • Detect It Easy (DIE) – Detects compiler and packer information.

⚙️ 2. Dynamic Analysis Tools

  • Cuckoo Sandbox – Automated malware sandbox.
  • Any.Run – Interactive cloud-based malware analysis.
  • Joe Sandbox – Advanced malware sandboxing.
  • FakeNet-NG – Simulates network services to capture malware behavior.

💾 3. Memory Forensics Tools

  • Volatility – Extracts artifacts from RAM dumps.
  • Rekall – Memory forensics and incident response.
  • RAM Capturer – Captures live RAM data.

🔗 4. Malware Behavior Analysis

🛠 5. Code & String Analysis Tools

  • YARA – Rule-based malware classification.
  • Floss – Extracts obfuscated strings from malware.
  • Binwalk – Extracts and analyzes firmware.

🌍 6. Online Malware Analysis Services


☁️ Cloud Forensics Tools

🔍 Cloud Logging & Monitoring

🗂 Cloud Storage Forensics

💾 Cloud Instance & Virtual Machine Forensics

📡 Cloud Network Traffic Analysis

🔑 Cloud Identity & Access Forensics

⚠️ Cloud Incident Response


📧 Email Forensics Tools

🔍 Email Header Analysis

📨 Email Metadata Extraction

  • EmailTracer – Python tool to extract and analyze email headers.
  • ExifTool – Extract metadata from email files (.eml, .msg).
  • Xplico – Extract emails from network traffic captures.

📜 Log & Email File Analysis

🔑 Phishing & Malicious Email Investigation

  • PhishTool – Identify phishing attempts from email headers.
  • VirusTotal – Scan email attachments and URLs for malware.
  • YARA – Detect patterns in malicious emails and attachments.

🛠️ Email Data Recovery & Conversion


🌟 Let's Connect!

Hello, Hacker! 👋 We'd love to stay connected with you. Reach out to us on any of these platforms and let's build something amazing together:

🌐 Website: https://yogsec.github.io/yogsec/
📜 Linktree: https://linktr.ee/yogsec
🔗 GitHub: https://github.com/yogsec
💼 LinkedIn (Company): https://www.linkedin.com/company/yogsec/
📷 Instagram: https://www.instagram.com/yogsec.io/
🐦 Twitter (X): https://x.com/yogsec
👨‍💼 Personal LinkedIn: https://www.linkedin.com/in/cybersecurity-pentester/
📧 Email: abhinavsingwal@gmail.com


☕ Buy Me a Coffee

Support Us Here: https://buymeacoffee.com/yogsec

About

A curated list of essential digital forensics tools used for investigation, data recovery, and security analysis. These tools help in disk forensics, memory analysis, network monitoring, malware analysis, and more.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Sponsor this project

Packages

No packages published