ForensicPosters
Poster forensic analyzer
A tool for creating and analyzing digital poster forensics data
435 stars
40 watching
81 forks
last commit: 6 months ago
Linked from 1 awesome list
Related projects:
Repository | Description | Stars |
---|---|---|
invoke-ir/powerforensics | A C#-based framework for analyzing and investigating hard drive forensic data | 1,385 |
swisscom/invoke-forensics | Tools for automating forensic analysis with KAPE and RegRipper | 109 |
invoke-ir/ace | A suite of tools for automating data collection and enrichment across multiple operating systems. | 322 |
mgreen27/invoke-liveresponse | A live response tool for targeted collection of data from compromised devices. | 145 |
ydkhatri/mac_apt | A digital forensics tool for analyzing macOS and iOS systems | 781 |
ricardojba/poi-slinger | Automatically identifies serialization issues in PHP applications by forcing them to perform DNS lookups with serialized objects | 42 |
busindre/dumpzilla | A forensic tool that extracts and analyzes interesting information from Firefox, Iceweasel, and Seamonkey browsers | 130 |
vitaly-kamluk/bitscout | A customizable tool for creating bootable disk images for remote system analysis and forensic investigations. | 462 |
pjrinaldi/wombatforensics | A multi-threaded GUI forensic analysis tool for Linux | 47 |
kevin-robertson/inveighzero | A .NET tool designed to intercept and manipulate network communications in both IPv4 and IPv6 environments. | 791 |
flo354/iosforensic | A tool to aid in forensic analysis of iOS devices | 63 |
securityjoes/forensicminer | Automates evidence collection and analysis from Windows machines using PowerShell. | 148 |
microsoft/infersharp | A tool that analyzes C# code for potential issues such as null pointer dereferences and resource leaks to help detect security vulnerabilities. | 732 |
idiom/pftriage | Tool to analyze files during malware analysis and triage by extracting properties and detecting malicious indicators. | 77 |
jgillam/burp-paramalyzer | An extension for parameter analysis in web application penetration testing | 154 |