Forensics

Forensics Tools – A Comprehensive Guide To Free And Open Source Resources

In the evolving field of digital forensics, having access to the right tools can make all the difference. This article provides a curated list of free and open-source forensic tools and resources designed for various types of digital investigations.

From live forensics and data acquisition to detailed artifact analysis and decryption, each category offers a suite of tools tailored for specific forensic tasks.

Whether you’re a beginner learning the ropes or an experienced investigator, this guide will serve as an essential resource to enhance your forensic toolkit.

A list of free and open source forensics analysis tools and other resources.

  • Forensics Tools
  • Collections
  • Tools
    • Distributions
    • Frameworks
    • Live forensics
    • Acquisition
    • Imageing
    • Carving
    • Memory Forensics
    • Network Forensics
    • Windows Artifacts
      • NTFS/MFT Processing
    • OS X Forensics
    • Mobile Forensics
    • Docker Forensics
    • Browser Artifacts
    • Timeline Analysis
    • Disk image handling
    • Decryption
    • Management
    • Picture Analysis
    • Steganography
    • Metadata Forensics
    • Website Forensics
  • Learn Forensics
    • CTFs
  • Resources
    • Books
    • File System Corpora
    • Twitter
    • Blogs
    • Other
  • Related Awesome Lists

Collections

Tools

For more information click here.

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

BypassAV : Techniques To Evade Antivirus And EDR Systems

BypassAV refers to the collection of techniques and tools used to bypass antivirus (AV) and…

16 hours ago

ComDotNetExploit : Exploiting Windows Protected Process Light (PPL)

ComDotNetExploit is a Proof of Concept (PoC) tool designed to demonstrate the exploitation of Windows…

16 hours ago

Trigon : A Revolutionary Kernel Exploit For iOS

Trigon is a sophisticated deterministic kernel exploit targeting Apple’s iOS devices, leveraging the CVE-2023-32434 vulnerability.…

16 hours ago

Bug Bounty Report Templates : Enhancing Efficiency In Vulnerability Reporting

Bug bounty report templates are essential tools for streamlining the process of documenting vulnerabilities. They…

16 hours ago

FullBypass : A Tool For AMSI And PowerShell CLM Bypass

FullBypass is a tool designed to circumvent Microsoft's Antimalware Scan Interface (AMSI) and PowerShell's Constrained…

18 hours ago

Carseat : A Python Implementation Of Seatbelt

Carseat is a Python-based tool that replicates the functionality of the well-known security auditing tool,…

21 hours ago