OCFA (Open Computer Forensics Architecture) :: Framework OCFA (Open Computer Forensics Architecture) :: Framework

The Open Computer Forensics Architecture (OCFA) is a modular computer forensics framework built by the Dutch National Police Agency [...

Read more »

Second Look (Linux Memory Forensics) :: Tools Second Look (Linux Memory Forensics) :: Tools

  The Incident Response edition of Second Look®: Linux Memory Forensics is designed for use by investigators who need quick, easy, and e...

Read more »

Android Data Extractor Lite (ADEL) :: Tools Android Data Extractor Lite (ADEL) :: Tools

Android Data Extractor Lite (ADEL) is a Python script that dumps all important SQLite Databases from a connected Android smartphone...

Read more »

MOBILedit Forensics :: Tools MOBILedit Forensics :: Tools

MOBILedit Forensics can retrieve all data from a phone with one click Generate forensic reports ready for the courtroom Relied upon b...

Read more »

SIMCon (SIM Card Forensics) :: Tools SIMCon (SIM Card Forensics) :: Tools

SIMCon is a program that securely images all files on a GSM SIM Card with a standard PC-SC smart card reader, either serial or USB . Af...

Read more »

CD/DVD Inspector (CD/DVD Forensics) :: Tools CD/DVD Inspector (CD/DVD Forensics) :: Tools

CD/DVD Inspector for intensive analysis and extraction of data from CD-R, CD-RW and all types of DVD media - including HD DVD and Blu-R...

Read more »

UFED Physical Analyzer (Mobile Forensics & Analysis) :: Tools UFED Physical Analyzer (Mobile Forensics & Analysis) :: Tools

UFED Physical Analyzer is the most advanced analysis, decoding and reporting application in the mobile forensic industry. It includes ...

Read more »

BitPim (Manage and Forensics Data of CDMA Phones) :: Tools BitPim (Manage and Forensics Data of CDMA Phones) :: Tools

BitPim is a program that allows you to view and manipulate data on many CDMA phones from LG, Samsung, Sanyo and other manuf...

Read more »

Photo Investigator (Analyze and Remove Photograph's Metadata) :: Tools Photo Investigator (Analyze and Remove Photograph's Metadata) :: Tools

The Photo Investigator ( PI ) is a free image forensic iOS App distributed on the iOS App Store. It specializes in the analysis and ...

Read more »

Scalpel (Data Carving / Forensics) :: Tools Scalpel (Data Carving / Forensics) :: Tools

Scalpel is a file carving and indexing application that runs on Linux and Windows .  The first version of Scalpel , released in 2005,...

Read more »

Bulk Extractor (Computer Forensics) :: Tools Bulk Extractor (Computer Forensics) :: Tools

Bulk Extractor is a computer forensics tool that scans a disk image, a file, or a directory of files and extracts useful information ...

Read more »

XVI32 (Hex Editor) :: Tools XVI32 (Hex Editor) :: Tools

XVI32 is a freeware hex editor running under Windows 9x/NT/2000/XP/Vista/7. The name XVI32 is derived from XVI , the roman notation ...

Read more »

FARADAY (Integrated Penetration Testing IDE) :: Framework FARADAY (Integrated Penetration Testing IDE) :: Framework

Faraday introduces a new concept (IPE) Integrated Penetration-Test Environment a multiuser Penetration test IDE . Designed for distrib...

Read more »

SNMPCheck (SNMP Enumeration) :: Tools SNMPCheck (SNMP Enumeration) :: Tools

SNMPCheck allows you to enumerate the SNMP devices and places the output in a very human readable friendly format. It could be useful ...

Read more »

Argus (Auditing Network Activity) :: Tools Argus (Auditing Network Activity) :: Tools

Argus is a fixed-model Real Time Flow Monitor designed to track and report on the status and performance of all network transactions s...

Read more »

Foremost (File Carving) :: Tools Foremost (File Carving) :: Tools

Foremost is a console program to recover files based on their headers, footers, and internal data structures. This process is common...

Read more »

Immunity Canvas (Vulnerability Exploitation) :: Tools Immunity Canvas (Vulnerability Exploitation) :: Tools

Immunity Canvas is a commercial vulnerability exploitation tool from Dave Aitel's ImmunitySec. It includes more than 370 exploits an...

Read more »
 
Top