Explore the cutting-edge capabilities of ForensiX, a robust digital forensics tool designed for deep analysis of Google Chrome data.
From preserving data integrity to detailed suspect profiling, ForensiX utilizes advanced machine learning models to enhance investigative processes.
This guide covers installation, features, and operational insights for effective data examination.
Requirements:
Clone repository:
git clone https://github.com/ChmaraX/forensix.git
Note: ML model need to be pulled using since its size is ~700MB. This model is already included in pre-built Docker image.
git lfs pull
Put directory with Google Chrome artifacts to analyze into default project directory. Data folder will me mounted as a volume on server startup.
The directory name must be named /data
.
cp -r /Default/. /forensix/data
To download prebuild images (recommended): Note: If there is error, you may need to use sudo
or set docker to not need a sudo prompt.
./install
Note: to build images from local source use -b
:
./install -b
Wait for images to download and then start them with:
./startup
If you want to use HTTPS
for communication between on UI or Server side, place key and certificate into /certificates
directory in either /server
or /client
directory.
To generate self-signed keys:
openssl req -nodes -new -x509 -keyout server.key -out server.cert
Change baseURL
protocol to https in /client/src/axios-api.js
, then rebuild the specific changed image:
docker-compose build <client|server>
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…
Embark on the journey of becoming a certified Red Team professional with our definitive guide.…
This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…
This took me like 4 days (+2 days for an update), but I got it…
MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…