Bulk extractor

DFIR Tools
Hot
bulk_extractor is a computer forensics tool that scans a disk image, a file, or a ...

DFIR Bloggers

Social Networks
Hot
Last PostBlogURLFeatured | Arsenal Recon Insights | arsenalrecon.com/insights/
Hot
**NOTE**The download link has disappeared. If you find it, submit it in a comment ...
Hot
SDB Explorer is a GUI program that allows for interacting with Microsoft Shim data...
Hot
"With the Advent of XP SP2 when a file1 is downloaded from the internet (i.e. by c...
Hot
Collection of SQL queries templates for digital forensics use by platform and appl...

PDF Examiner

DFIR Tools
Hot
Hot
"When time is short and you need to acquire entire volumes or selected individual ...
Hot
"Cellebrite's UFED Reader is a free, executable application, purpose-designed for ...
Hot
In most of the digital steganography methods provided for natural digital images, ...
Hot
"Mobile digital data has become critical evidence in criminal cases, adding a sign...

Forensic Notes

DFIR Tools
FeaturedHot
 The Forensic Notebook will contain all your notes related to the case, timestampe...
Hot
This lab is for learning and practicing forensics! We will be providing training f...
Hot
Registry Explorer is a new approach to interacting with Registry hives. It has sev...

AppCompatCache

Artifacts
Hot
"As background, the Application Compatibility Cache is used by the Windows operati...
Paraben is a digital forensics technology provider specializing in smartphone fore...

Maresware Total

DFIR Tools
Hot
Total performs several useful functions. Use it to: total fields in succeeding rec...

de4dot

DFIR Tools
Hot
".NET deobfuscator and unpacker." github.com/0xd4d/de4dot
Hot
"Belkasoft Evidence Center makes it easy for an investigator to search, analyze, s...

Last visited MRU

Artifacts
Hot
Tracks the executable and directory location that an application uses to open file...

Paraben E3:DS

DFIR Tools
Hot
 Mobile forensics is the most dynamic of the digital forensic disciplines. Underst...
Hot
Master the tools and techniques of mobile forensic investigationsConduct mobile fo...
FeaturedHot
The Definitive Guide to File System Analysis: Key Concepts and Hands-on Techniques...
Hot
The E3:Universal provides top tier acquisition, analytics, and reporting to optimi...

Amcache

Artifacts
Hot
The Amcache.hve is a registry hive file that is created by Microsoft® Windows® to ...
Hot
An interactive book-and-DVD package designed to help readers master the tools and ...
FeaturedHot
HUGE collection of registry artifacts related to forensics!

FeatureUsage

Artifacts
Hot
 So what does it track and where are forensic artifacts located? It tracks events ...

Unified Logs

Artifacts
Hot
The new Unified Logging and Tracing System for iOS and macOS uses Activity Tracing...
Hot
Profiles default directory name is randomly generated for each user
Hot
Firefox cache (Mac)
Hot
Profiles default directory name is randomly generated for each user
Hot
Firefox bookmarks and form history 
Hot
facetime recent calls 
Hot
Facetime log - initial contact 
Hot
facetime account info 
NewHot
Complexity and sophistication among multimedia-based tools have made it easy for p...
NewHot
The number of cyber attacks has increased tremendously in the last few years. This...
NewHot
One of the digital forensics activities has the goal to prove a cybercrime. There ...
NewHot
Programming errors in Ethereum smart contracts can result in catastrophic financia...
NewHot
This paper identifies the need for a comprehensive digital forensic investigation ...
FeaturedNewHot
In order to take the MCFE-IEF course, students must first successfully enroll and ...
FeaturedNewHot
Prior to the end of the two-year certification period, students must complete a re...
FeaturedNewHot
The MCFE certification for Magnet AXIOM will last for 2 years from the date of suc...
Hot
Maximizing the positive effects and minimizing the negative effects of employee mo...
Hot
Data recovery is one of the tools used to obtain digital forensics from various st...
Hot
Network covert channels are increasingly used to endow malware with stealthy behav...
Hot
Volumes of digital images are produced per time, whiles these digital images may b...
Hot
The use of social media has spread through many aspects of society, allowing milli...
Hot
Nowadays, more and more researchers are interested in reversible data hiding in en...
Hot
Cyber attacks are currently blooming, as the attackers reap significant profits from...
Hot
We all know how digital technology has irreversibly changed our daily lives: we no...
Hot
New smartphones made by small companies enter the technology market everyday. Thes...
Hot
With the development of deep learning, convolutional multimedia forensics for task...
Hot
In today's Industrial IoT (IIoT) environment, where different systems interact wit...
Hot
The challenges faced by organizations in effectively carrying out digital forensic...
The growing preference of automation and digital transformation over semi manual o...
Hot
In the past, digital forensic, with its exploration techniques, are a lane to the ...
Hot
Internet security can be compromised not only through the threat of malware, fraud...
Hot
Forensic analysis and evidence collection for web browser activity is a recurring ...
Hot
The paper considers the impact of cybercrime on the rise in consumption and creati...
Hot
Free VHDX ViewerFree DjVu ViewerFree Windows Backup ViewerFree Netscape ViewerFree...
Hot
Free PST ViewerFree OST ViewerFree MBOX ViewerFree Thunderbird ViewerFree Eudora V...
Hot
PST Password RecoveryPST Unlock WizardUnlock PDF WizardLock PDF WizardAadhaar Card...
Hot
EML to PST WizardMSG to PST WizardMBOX Converter WizardThunderbird WizardBAT Wizar...
Hot
Thunderbird Backup WizardGmail Backup WizardOffice 365 Backup WizardOutlook Webmai...
Hot

Wintriage

DFIR Tools
 Wintriage is a live response tool that extracts Windows artifacts. It must be exe...
Hot
Email conversion, email migration, data migration, email viewers.Zimbra ExportWind...
Hot

KStrike

DFIR Tools
Stand-alone parser for User Access Logging from Server 2012 and newer systems This...
Hot

Email Analyzer

DFIR Tools
 This tool parses email message sources to extract and display important informati...
Hot
Email ConversionChoose From a Range of Email Converters Supporting Conversion Betw...
Hot

Name That Hash

DFIR Tools
Have you ever come across a hash such as 5f4dcc3b5aa765d61d8327deb882cf99 and wond...
Hot

Belkasoft X

DFIR Tools
Belkasoft X is an easy-to-use and powerful digital forensics and incident response...
Hot
NSF Converter is a significant software to convert NSF file into Outlook PST forma...
Hot
Two query become mandatory here - how to export Lotus Notes to Outlook or what is ...
Hot
How to export OST to PST format? – It can solve with this admirable software that ...
Hot
MS-Office-ooxml-file-parser
Hot

SQLite queries

DFIR Tools
BrowsersMozilla Firefox 61+:firefox_places.sqlfirefox_favicons.sqlfirefox_formhist...
Hot

WindowsTimeline

DFIR Tools
Works with any ActivitiesCache.db (Windows 1703/1709/1803/1809/1903/1909/2004 ..) ...
Hot
Welcome, hackers. This is a live, playable archive of DEF CON CTF challenges. Brou...
Hot

Hash List Importer

DFIR Tools
This EnScript is designed to read a text file containing one or more hash items an...
Hot
Local Website Archive offers a fast and easy way to store information from the web...