Showing 111 open source projects for "forensics"

View related business solutions
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • Forever Free Full-Stack Observability | Grafana Cloud Icon
    Forever Free Full-Stack Observability | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 1
    Droideasy Android Forensics kit help you do Forensics task easy so you can your time you can get android apps list .recover wifi key android, Gesture key Removed Password key Removed Whatsapp Database with key.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    The Sleuth Kit is a C++ library and collection of open source file system forensics tools that allow you to, among other things, view allocated and deleted data from NTFS, FAT, FFS, EXT2, Ext3, HFS+, and ISO9660 images.
    Downloads: 10 This Week
    Last Update:
    See Project
  • 3
    MobiSec

    MobiSec

    Mobile security testing live environment

    This project was a DARPA CFT funded project that is now being released through OWASP. It is focused on providing a live environment for mobile security testing, forensics, reverse engineering and wireless analysis.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 4
    cyborghawk v1.1

    cyborghawk v1.1

    Latest-v1.1 of The World's most advanced pen testing distribution ever

    updated version of The most advanced, powerful and yet beautiful penetration testing distribution ever created.Lined up with ultimate collection of tools for pro Ethical Hackers and Cyber Security Experts. Simplify security in your IT infrastructure with Cyborg. Its real strength comes from the understanding that a tester requires a strong and efficient system,that benefits from a strong selection of tools, integrated with a stable linux environment.
    Downloads: 127 This Week
    Last Update:
    See Project
  • Go from Code to Production URL in Seconds Icon
    Go from Code to Production URL in Seconds

    Cloud Run deploys apps in any language instantly. Scales to zero. Pay only when code runs.

    Skip the Kubernetes configs. Cloud Run handles HTTPS, scaling, and infrastructure automatically. Two million requests free per month.
    Try it free
  • 5
    santoku

    santoku

    Mobile Forensics, Malware Analysis, and App Security Testing

    Santoku is an easy to use, Open Source platform, dedicated to mobile forensics, analysis, and security. Version 0.5: md5: c2dcab27e6444730acc9bc351f34e543 sha1: 4d39adc01c443ac24a53a33f0ac077980d77c1fe sha256: ed72a014033c621c0da632b7e9853920b834a4bceae4427513737f7cf5ff0f55
    Leader badge
    Downloads: 121 This Week
    Last Update:
    See Project
  • 6

    ext2 info hiding mod

    Information Hiding Modification for EXT2

    ...The information hiding approach used in this project was introduced by Khan et. al in 'Designing a cluster-based covert channel to evade disk investigation and forensics' (1st approach). Algorithm: When a cover file is written, an even blocknr. (for the 1st datablock) is choosen to represent a 0 or an odd blocknr. to represent an 1. For the remaining blocks of the cover file till the end of the code is reached, an adjacent blocknr. represents the same bit as the previous one and a non-adjacent blocknr. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Matriux
    Matriux is a GNU/Linux, Debian based security distribution designed for penetration testing and cyber forensic investigations. It is a distribution designed for security enthusiasts and professionals, can also be used normally as your default OS.
    Downloads: 45 This Week
    Last Update:
    See Project
  • 8
    HoneyDrive

    HoneyDrive

    Honeypots in a box! HoneyDrive is the premier honeypot bundle distro.

    ...Additionally it includes many useful pre-configured scripts and utilities to analyze, visualize and process the data it can capture, such as Kippo-Graph, Honeyd-Viz, DionaeaFR, an ELK stack and much more. Lastly, almost 90 well-known malware analysis, forensics and network monitoring related tools are also present in the distribution.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 9
    ESSPEE - Penetration Testing & Forensics

    ESSPEE - Penetration Testing & Forensics

    (Android Forensics & Malware Analysis Included)

    ...Being a sole developer to this distro, I wish it would help Open Source community with a better interface for Vulnerability Analysis, Penetration Testing, Malware analysis, Android and Cyber Forensics. I really enjoyed my work for the last three years. Please let me know about bugs and if possible provide solution also.
    Leader badge
    Downloads: 1 This Week
    Last Update:
    See Project
  • Stop Storing Third-Party Tokens in Your Database Icon
    Stop Storing Third-Party Tokens in Your Database

    Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.

    Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
    Try Auth0 for Free
  • 10
    Pyringe

    Pyringe

    Debugger capable of attaching to and injecting code into python

    pyringe is a powerful Python process “syringe” that attaches to a running interpreter and lets you introspect—and even execute code inside—that live process. It blends debugger-style attachment (via gdb/ptrace techniques) with Python-aware helpers so you can inspect threads, frames, locals, and heap objects without restarting the target. This is invaluable for post-mortem diagnosis of production daemons where reproducing a bug in a dev shell is impractical. pyringe can inject arbitrary...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    OpenLV

    A forensics tool that bridges collected evidence & virtualization

    OpenLV helps first responders quickly and safely interact with potential evidence much as if they sat down and interacted with a suspect PC
    Leader badge
    Downloads: 9 This Week
    Last Update:
    See Project
  • 12
    Skype Xtractor

    Skype Xtractor

    Xtractor for Skype's databases (main.db and chatsync)

    Skype xtractor for Linux and Windows is a python tool developed for the Forensics distro DEFT Linux 8. Extracts data from the Skype's main.db, including contacts, chats, calls, file transfers, and deleted/modified messages from chatsync databases Usage: read README file Required: Python 2.7 Feedback and bug reporting appreciated :)
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13
    Nullcon 2014 CTF Forensics challenge file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Shell OS
    Build by Rajib Acharyya(Spid3r64) ANONIMITY Metasploit Armitage Cobalt Strike & veil WIRELESS SECURITY SNIFFERS PYTHON,PERL & RUBY FORENSICS BRUTE FORCE & DDOS ANDROID TOOLS Based on : Ubuntu 12.04 LTS(32bit) (Custom Backbox) user:root pass:india Kernel version =>3.8.0-29 generic Desktop environment's => xfce,conky,Docky Version 1.0(full) Extra Softwares inbuilt => Skype,Virtualbox,Filezila,Chromium Browser,XDM(Xtreme Download Manager) ,Gimp,Python...many more Credit List: Pedro Ubuntu(r00tsect0r) For Netool.sh Asif Iqbal (cobalt strike) w0lf3nst3in3 Rohit Verma(Startx) Navonil Sanpui(M3ghnath) Team BHS
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    NullconCTF2013

    Forensics challenge for Nullcon 2013 CTF

    The file contains here is a disk image. You are supposed to find the information as per the CTF requirement.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    ISSE

    ISSE

    An Interactive Source Separation Editor

    In applications such as audio denoising, music transcription, music remixing, and audio-based forensics, it is desirable to decompose a single-channel recording into its respective sources. To perform such tasks, we present a new software tool to perform source separation by painting on time-frequency visualizations of sound. Initial results shows the software can achieve state-of-the-art separation results compared to prior work.
    Leader badge
    Downloads: 12 This Week
    Last Update:
    See Project
  • 17

    Stratagem - A honeypot distribution

    A Linux based honeypot distribution

    Stratagem is a Linux distro for honeypots, network forensics, malware analysis and other supporting tools. Stratagem is based on Linux Mint 14 XFCE. The following honeypots are setup and ready to go. Dionaea Kippo Glastopf HoneyD Amun labrea Tinyhoneypot Thug Conpot (See the wiki for more details on the contents)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    iRecover was developed to aid forensics investigators by combining other commonly used command-line forensics tools into a simple graphical user interface. iRecover provides a GUI interface using the Perl/Tk programming library for forensics examiners to use when retrieving deleted files from an image/ file partition under forensic investigation. Investigators can use this tool to selectively retrieve only certain kinds of files (text, images, video, audio, documents, etc.) for a quick overview of information or for recovery using the "icat" Sleuth Kit tool to actually go into the image and select the files of interest to display.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19

    FLSmac

    User friendly command line interface for image timeline analysis

    FLSmac provides a simple to use interface written in perl to integrate the most commonly used FLS and mactime commands to create a forensics timeline from a disk image. In addition, it shows you the command as it is being built so that you can verify its accuracy AND learn how the commands were assembled. Installation Simply un-tar the folder to the location of your choosing (ex: tar -xvf flsmac.tar). Usage ./flsmac.pl Optional Parameters -h Displays help file [image_name] Send the file name as input image Requirements SleuthKit and perl must be installed SleuthKit is available from: http://www.sleuthkit.org/sleuthkit/download.php Limitations - Has to create a temporary file to catch the output of FLS at /tmp/flsmactmp which is deleted after mactime execution...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    RŌNIN-LINUX

    RŌNIN-LINUX

    Linux Security Distro for Data Forensics, Pen. Testing, and IR.

    RŌNIN is a linux security distribution (based on Lubuntu) that provides a platform for both training and conducting professional data forensics, penetration testing, and incident response. The primary objective of RŌNIN is to provide a fast/light linux desktop along with a curation of security tools and resources that are relevant for professionals, instructors, and students alike. In support of this objective, the RŌNIN project is guided by two main goals: * Focus on Continual Learning - The project provides a platform for continual learning by providing not only a professional tool-set but also easy access to relevant documentation, resources, and training...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 21

    JumpBag Live Forensics

    A tool for acquiring volatile memory on Windows systems.

    JumpBag is primarily a batch script that runs DumpIt by MoonSols to gather Windows active memory before running a series of commands to record other volatile information. JumpBag was created with the goal of one-click volatile information acquisition for a live system. Contact the creator at: brs9971@rit.edu
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    LinuxNub Forensics Learning Program

    Simple Python Script that helps teach a user Linux Forensics

    A simple python based script that runs Linux tools from the command line to conduct a simple Linux forensic investigation of a targeted image. Currently a work in progress. Contact Info: joem3921@gmail.com
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Dos.sec.box
    This is a project Im working on for Forensics of pc's Using the open source world
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24

    Port Authority

    Gains basic data about FreeBSD ports install for forensics analysis

    Tools for finding programs installed on FreeBSD image using the ports system and cleanly outputting information like modify, access, and change times. Can also be used to find the UID of the user that most likely installed the program and attempts to use passwd file backups to put a login name to that user.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    LAF Forensics Tool

    Tool to be used in Capture the Flag Competitions

    The LAF forensics tool (Referred to simply as LAF) was created for use in Information Security Capture the Flag competitions. The tool is written in two parts - a Windows and Linux version. They are both written in Python with the Linux version making use of curses. The tool is customizable and open source. Created by RIT Students Brian Sypher - bjs5244 <AT> rit <DOT> edu David Anthony - dma4999 <AT> rit <DOT> edu Artem Panasenkov - asp7980 <AT> rit <DOT> edu
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB