Explore the cutting-edge capabilities of ForensiX, a robust digital forensics tool designed for deep analysis of Google Chrome data.
From preserving data integrity to detailed suspect profiling, ForensiX utilizes advanced machine learning models to enhance investigative processes.
This guide covers installation, features, and operational insights for effective data examination.
Requirements:
Clone repository:
git clone https://github.com/ChmaraX/forensix.git
Note: ML model need to be pulled using since its size is ~700MB. This model is already included in pre-built Docker image.
git lfs pull
Put directory with Google Chrome artifacts to analyze into default project directory. Data folder will me mounted as a volume on server startup.
The directory name must be named /data
.
cp -r /Default/. /forensix/data
To download prebuild images (recommended): Note: If there is error, you may need to use sudo
or set docker to not need a sudo prompt.
./install
Note: to build images from local source use -b
:
./install -b
Wait for images to download and then start them with:
./startup
If you want to use HTTPS
for communication between on UI or Server side, place key and certificate into /certificates
directory in either /server
or /client
directory.
To generate self-signed keys:
openssl req -nodes -new -x509 -keyout server.key -out server.cert
Change baseURL
protocol to https in /client/src/axios-api.js
, then rebuild the specific changed image:
docker-compose build <client|server>
garak checks if an LLM can be made to fail in a way we don't…
Vermilion is a simple and lightweight CLI tool designed for rapid collection, and optional exfiltration…
ADCFFS is a PowerShell script that can be used to exploit the AD CS container…
Tartufo will, by default, scan the entire history of a git repository for any text…
Loco is strongly inspired by Rails. If you know Rails and Rust, you'll feel at…
A data hoarder’s dream come true: bundle any web page into a single HTML file.…