Explore the cutting-edge capabilities of ForensiX, a robust digital forensics tool designed for deep analysis of Google Chrome data.
From preserving data integrity to detailed suspect profiling, ForensiX utilizes advanced machine learning models to enhance investigative processes.
This guide covers installation, features, and operational insights for effective data examination.
Requirements:
Clone repository:
git clone https://github.com/ChmaraX/forensix.git
Note: ML model need to be pulled using since its size is ~700MB. This model is already included in pre-built Docker image.
git lfs pull
Put directory with Google Chrome artifacts to analyze into default project directory. Data folder will me mounted as a volume on server startup.
The directory name must be named /data
.
cp -r /Default/. /forensix/data
To download prebuild images (recommended): Note: If there is error, you may need to use sudo
or set docker to not need a sudo prompt.
./install
Note: to build images from local source use -b
:
./install -b
Wait for images to download and then start them with:
./startup
If you want to use HTTPS
for communication between on UI or Server side, place key and certificate into /certificates
directory in either /server
or /client
directory.
To generate self-signed keys:
openssl req -nodes -new -x509 -keyout server.key -out server.cert
Change baseURL
protocol to https in /client/src/axios-api.js
, then rebuild the specific changed image:
docker-compose build <client|server>
Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…
MODeflattener is a specialized tool designed to reverse OLLVM's control flow flattening obfuscation through static…
"My Awesome List" is a curated collection of tools, libraries, and resources spanning various domains…
CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, allowed attackers to execute arbitrary…
The blog post "Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internals" provides…
The exploitation of CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, relies on…