April 23, 2021

Cyber Forensicator

  • Articles
  • Books
  • Contact
  • How To
  • News
  • Presentations
  • Science
  • Software
  • Tips & Tricks
  • Videos
  • Webinars
  • White Papers
Home Software (page 2)

Software

Software

yara_tools: Create YARA Rules In Python

Michael Matonis has written a library that helps security researchers create simple or complex YARA rules in Python. It’s called yara_tools, you can learn more about it here.

Read More
Software

iOS Mobile Installation Logs Parser

Alexis Brignoni has written a script for parsing all the logs in the /private/var/installd/Library/Logs/MobileInstalation/.log. As the result, you’ll get “a currently installed apps report, a uninstalled apps report and historical reports for both types per app.” You can learn more about this tool and download it here.

Read More
Software

PA Toolkit

PA Toolkit is a collection of traffic analysis plugins to extend the functionality of Wireshark from a micro-analysis tool and protocol dissector to the macro analyzer and threat hunter. PA Toolkit contains plugins (both dissectors and taps) covering various scenarios for multiple protocols, including: WiFi (WiFi network summary, Detecting beacon, deauth floods etc.)HTTP (Listing all visited websites, downloaded files)HTTPS (Listing …

Read More
Software

Malcom: Malware Communication Analyzer

Malcom is a tool designed to analyze a system’s network communication using graphical representations of network traffic, and cross-reference them with known malware sources. This comes handy when analyzing how certain malware species try to communicate with the outside world. You can read more about the tool and download it here.

Read More
Software

PasteHunter

PasteHunter is a Python3 application that is designed to query a collection of sites that host publicliy pasted data. For all the pastes it finds it scans the raw contents against a series of yara rules looking for information that can be used by an organization or a researcher.

Read More
Software

Open Forensic Images with Forensic7z

Forensic7z is a plugin for 7-Zip archiver that can be used for opening and browsing disk images created by specialized software for forensic analysis, such as Encase or FTK Imager. At the moment, the Forensic7z plugin supports images in the following formats: ASR Expert Witness Compression Format (.S01) Encase Image File Format (.E01, .Ex01) Encase Logical Image File Format (.L01, …

Read More
Software

Refined VirusShare Hash Sets

MantaRay Forensics team converted VirusShare.com 0-337 hash sets to RAW, EnCase and Autopsy format. The new set contains 31,908,993 MD5 notable hash values. The RAW hash set is compatible with AXIOM from Magnet Forensics. You can download refined hash sets here.

Read More
Software

Extract forensic timeline from memory dumps with AutoTimeliner

Andrea Fortuna created the AutoTimeliner, a tool that “automagically extract forensic timeline from volatile memory dumps.” It constructs the timeline based on the output of the following Volatility plugins: timeliner, mftparser, and shellbags. You can download the tool here.

Read More
Software

RBCmd: Recycle Bin artifact parser

Eric Zimmerman has released a new tool. This time it’s Recycle Bin artifact parser called RBCmd. It supports both INFO2 and $I formats. You can download the tool here.

Read More
Software

CAINE 10.0 “Infinity” is out

A new version of CAINE (Computer Aided INvestigative Environment) has been released. Version 10.0 includes new OSINT, Autopsy 4.9, it’s APFS ready, has BTRFS foresic tool, NVME SSD drivers ready. Learn more about the new version here.

Read More
Page 2 of 1412345 10...Last

Follow Us

About Us

Cyber Forensicator is a web-project by Igor Mikhaylov and Oleg Skulkin aiming on collecting all most interesting and important cyber and digital forensics news, articles, presentations, and so on, in one place.

Popular Posts

Open Sourcing JA3: SSL/TLS Client Fingerprinting for Malware Detection

October 20, 2017

Cloud Forensics: Analyzing MEGASync

April 15, 2018

Windows Phone Physical Imaging Without JTAG and Chip-off

June 3, 2018

Timeline

  • March 4, 2021

    Find out what happened during a ransomware attack on computer

  • January 24, 2021

    Analyzing videos with multiple video streams in digital forensics

  • December 19, 2020

    PC3000 Portable III in Digital Forensics

  • December 18, 2020

    How to analyze different types of devices and find connections between them

  • July 5, 2020

    Threat Hunting: What it Is, and What it Is Not

CyberForensicator.com © Copyright 2016-2021, All Rights Reserved

Login

Welcome!Log into your account