PowerForensics

Forensic analyzer

A C#-based framework for analyzing and investigating hard drive forensic data

PowerForensics provides an all in one platform for live disk forensic analysis

GitHub

1k stars
158 watching
274 forks
Language: C#
last commit: about 1 year ago
Linked from 4 awesome lists


Backlinks from these awesome lists:

Related projects:

Repository Description Stars
invoke-ir/forensicposters A tool for creating and analyzing digital poster forensics data 435
swisscom/invoke-forensics Tools for automating forensic analysis with KAPE and RegRipper 109
securityjoes/forensicminer Automates evidence collection and analysis from Windows machines using PowerShell. 148
invoke-ir/ace A suite of tools for automating data collection and enrichment across multiple operating systems. 322
microsoft/infersharp A tool that analyzes C# code for potential issues such as null pointer dereferences and resource leaks to help detect security vulnerabilities. 732
jimtin/ircoreforensicframework Automates incident response actions to gather and process forensic artefacts from remote systems 22
flo354/iosforensic A tool to aid in forensic analysis of iOS devices 63
mgreen27/invoke-liveresponse A live response tool for targeted collection of data from compromised devices. 145
anssi-fr/dfir4vsphere A PowerShell module for collecting logs and forensics data from VMware vSphere environments. 140
thehive-project/cortex-analyzers Develops and stores custom analysis tools for digital forensics and threat intelligence 434
vitaly-kamluk/bitscout A customizable tool for creating bootable disk images for remote system analysis and forensic investigations. 462
pjrinaldi/wombatforensics A multi-threaded GUI forensic analysis tool for Linux 47
dissectmalware/officeforensictools A Python-based collection of tools for gathering forensic information from Office documents 26
evild3ad/memprocfs-analyzer Automated forensic analysis tool for Windows memory dumps 540
shanek2/invtero.net Analyzes and validates physical memory from various systems to extract process information and hypervisor details 279