Register and you can:

1) Submit reviews
2) Vote (by stars 1-5) on DFIR software
3) "Favorite" the apps you want to keep track of with your own page.

You'll receive no email from dfir.training. Creating an account is necessary to make reviews (to prevent website spam), and vote on DFIR software. If you do not register, you will still have access to all website content, but just won't be able to vote or maintain a favorite list of tools as your own page.

Directory: Recently Added Listings RSS

Kuniper Forensics XT_RAW New!

0 reviews

kuiper.de/index.php/products/x-tensions

XT_RAW is an X-Tension for X-Ways Forensics which is able to detect (by extension, by header) and convert RAW-images made by modern cameras. Detection by Extension3FR, ARI, ARW, BAY, CAP, CINE, CR2, CRW, CS1, CS16, CS4, DATA, DC2, DCR, DCS, DNG, DRF ...
Read More...

SteganoG New!

0 reviews

www.gaijin.at/dlsteg.php

Steganog stores sensitive data of all kinds in a bitmap file so that the image remains unchanged. Powerful compression and adjustable image quality also allow the storage of relatively large amounts of data. The encryption procedures RC4, Blowfish, TEA, ...
Read More...

Category:Steganography

FAME New! Popular

0 reviews

certsocietegenerale.github.io/fame/

FAME is an open source malware analysis platform that is meant to facilitate analysis of malware-related files, leveraging as much knowledge as possible in order to speed up and automate end-to-end analysis. FAME should be seen as a malware analysis fram ...
Read More...

Stegosaurus New!

0 reviews

bitbucket.org/jherron/stegosaurus/overview

Stegosaurus is a steganography tool that is used for embedding payloads within Python byte code. The process does not modify the runtime performance or file size of the carrier file and typically results in a low encoding density. The payload is isolated ...
Read More...

Category:Steganography

Le-tools.com XL-FileTools New! Popular

0 reviews

le-tools.com/XL-FileTools.html

XL-FileTools provides a bunch of functions for files, grouped in three categories: Category Functions List There are two types:- List of files produces a tab of informations about files that can include full path, filename, hash value (MD5, ...
Read More...

Category:File Copying

Le-tools.com XL-Tools New!

0 reviews

le-tools.com/XL-Tools.html

XL-Tools provides a bunch of functions for list of strings, grouped in five categories : Category Functions Lists No duplicate, Only duplicates, Count items, Count characters, L1-L2, Column to row, Row to column, List to regex, Concat, Split ...
Read More...

Category:Network/Traffic

Le-tools.com XL-Whois New!

0 reviews

le-tools.com/XL-Whois.html

XL-Whois is a tool to make multiple advanced whois requests; It supports Domain Whois, Network Whois and DNS Records; Object for the requests are parsed from the clipboard content so time to prepare the request is reduced to minimum; Supported object ...
Read More...

Category:Network/Traffic

le-tools.com/ConvertShellcode.html

ConvertShellcode takes Shellcode as input and disassemble it in a list of instructions in assembly language.

Category:Misc

Le.tools.com ExtractFace New!

0 reviews

le-tools.com/ExtractFace.html

Investigators, researchers or other analysts often have to get local copies of Facebook data. It can be necessary for a lot of reasons like submitting Facebook data as evidence, doing advanced offline analysis, etc. But Facebook interface has not been des ...
Read More...

inVtero.net New!

0 reviews

github.com/ShaneK2

A high speed (Gbps) Forensics, Memory integrity & assurance. Includes offensive & defensive memory capabilities. Find/Extract processes, hypervisors (including nested) in memory dumps using microarchitechture independent Virtual Machiene Introspec ...
Read More...

Category:Memory

www.nccgroup.trust/us/about-us/resources/forensic-fuzzing-to

This is a collection of scripts that can be used to generate fuzzed files, fuzzed file systems, and file systems containing fuzzed files. These can be used to test the robustness of forensics tools and examination systems. Prerequisites: Linux/Pytho ...
Read More...

Category:Misc

github.com/digital-preservation/droid

More information can be found on the DROID github pages here: http://digital-preservation.github.com/droid/ DROID is a software tool developed by The National Archives to perform automated batch identification of file formats. Developed by ...
Read More...

Category:Misc

Cerbero Profiler

0 reviews

cerbero.io

Cerbero Profiler is a tool designed primarily for malware and forensic analysis. It supports a huge number of file formats (listed below) on which it performs analysis and lets the user inspect their internal layout. Profiler is often used to identify 0-d ...
Read More...

inteltechniques.com/buscador/

Buscador is a Linux Virtual Machine that is pre-configured for online investigators.

Category:OSINT

github.com/cloudtracer/ThreatPinchLookup

ThreatPinch Lookup creates informational tooltips when hovering oven an item of interest on any website. It helps speed up security investigations by automatically providing relevant information upon hovering over any IPv4 address, MD5 hash, SHA2 hash, an ...
Read More...

Hexinator

0 reviews

hexinator.com

Powerful Free Hex Editor for Windows and Linux

Category:Hex Editors

Hex Fiend

0 reviews

ridiculousfish.com/hexfiend/

A fast and clever open source hex editor for Mac OS X.

Category:Hex Editors

Cyber Triage

0 reviews

www.cybertriage.com

The first step in an effective first response is to ensure that you collect the right data.  Unlike other commercial tools, Cyber Triage does not require an agent to be installed on a live system. Instead, the collection tool is pushed out as needed ...
Read More...

Category:Triage