Forensics

Forensics Tools – A Comprehensive Guide To Free And Open Source Resources

In the evolving field of digital forensics, having access to the right tools can make all the difference. This article provides a curated list of free and open-source forensic tools and resources designed for various types of digital investigations.

From live forensics and data acquisition to detailed artifact analysis and decryption, each category offers a suite of tools tailored for specific forensic tasks.

Whether you’re a beginner learning the ropes or an experienced investigator, this guide will serve as an essential resource to enhance your forensic toolkit.

A list of free and open source forensics analysis tools and other resources.

  • Forensics Tools
  • Collections
  • Tools
    • Distributions
    • Frameworks
    • Live forensics
    • Acquisition
    • Imageing
    • Carving
    • Memory Forensics
    • Network Forensics
    • Windows Artifacts
      • NTFS/MFT Processing
    • OS X Forensics
    • Mobile Forensics
    • Docker Forensics
    • Browser Artifacts
    • Timeline Analysis
    • Disk image handling
    • Decryption
    • Management
    • Picture Analysis
    • Steganography
    • Metadata Forensics
    • Website Forensics
  • Learn Forensics
    • CTFs
  • Resources
    • Books
    • File System Corpora
    • Twitter
    • Blogs
    • Other
  • Related Awesome Lists

Collections

Tools

For more information click here.

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

Pystinger : Bypass Firewall For Traffic Forwarding Using Webshell

Pystinger is a Python-based tool that enables SOCKS4 proxying and port mapping through webshells. It…

7 days ago

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…

7 days ago

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…

1 week ago

How to Bash Append to File: A Simple Guide for Beginners

If you are working with Linux or writing bash scripts, one of the most common…

1 week ago

Mastering the Bash Case Statement with Simple Examples

What is a bash case statement? A bash case statement is a way to control…

1 week ago

How to Check if a File Exists in Bash – Simply Explained

Why Do We Check Files in Bash? When writing a Bash script, you often work…

1 week ago