April 20, 2021

Cyber Forensicator

  • Articles
  • Books
  • Contact
  • How To
  • News
  • Presentations
  • Science
  • Software
  • Tips & Tricks
  • Videos
  • Webinars
  • White Papers
Home Software (page 3)

Software

Software

Apple Pattern of Life Lazy Output’er (APOLLO)

Sarah Edwards presented a new tool called APOLLO or Apple Pattern of Life Lazy Output’er. The tool was presented at Objective by the Sea – Mac Security Conference. You can find the slides here, and download the tool for testing (it’s in beta now!) here.

Read More
Software

Backstage Parser

Arsenal’s Brian Gerdon presented Backstage Parser – a python tool that can be used to parse the contents of Microsoft Office files found in the “\Users(User)\AppData\Local\Microsoft\Office\16.0\BackstageinAppNavCache” path. Learn more about the tool at Arsenal’s GitHub.

Read More
Software

Acquire Volatile Memory from FreeBSD with FreeBmAM

Free-B-sd m-emory A-cquisition M-odule Tool/Kernel Module allows acquisition of volatile memory from FreeBSD. You can learn more about the tool at GitHub.

Read More
Software

DEFT X Virtual Appliance is Available for Downloading

The latest version of the system dedicated to forensic analysis and incident management, DEFT X, is released and available for downloading here.

Read More
Software

GiftStick: 1-Click Push Forensics Evidence to the Cloud

GiftStick allows an inexperimented user to easily (one click) upload forensics evidence (such as some information about the system, a full disk image as well as the system’s firmware, if supported) from a target device (that will boot on an external device containing the code) to Google Cloud Storage. Learn more about the project at GitHub.

Read More
Software

Autopsy 4.9.0 and the Sleuth Kit 4.6.3 released

New versions of our open source DFIR tools have been released: Autopsy New Features: Removed data from table that are time intensive and can be found in content viewers (such as hash set hits) Added ability to find common items (files, emails, etc.) between current case and past cases using the Central Repository. Added ability to ignore common items that …

Read More
Software

Amcache_Scan Autopsy Plugin

This Autopsy plugin by Rebecca Anderson won Autopsy Plugin Contest this year at Open Source Digital Forensics Conference (OSDFCon). It searches Virus Total for SHA1 hashes of executables from amcache. You can get the plugin here.

Read More
Software

Memtriage v0.2-alpha Released

0.2-alpha version of memtriage has been released. This tool allows you to quickly query a Windows machine for RAM artifacts. It utilizes the Winpmem drivers to access physical memory, and Volatility for analysis.

Read More
Software

winmem_decompress: Extract Сompressed Memory Pages from Page-Aligned Data

Maxim Suhanov presented winmem_decompress – a program that tries to extract compressed memory pages from page-aligned data. Such compressed memory pages can be found in virtual memory of Windows 8.1 & 10 operating systems. Learn more about the tool here.

Read More
Software

libfsapfs: Library and Tools to Access the Apple File System (APFS)

libfsapfs is a library and tools by Joachim Metz to access the Apple File System (APFS). Source code is available at GitHub.

Read More
Page 3 of 1412345 10...Last

Follow Us

About Us

Cyber Forensicator is a web-project by Igor Mikhaylov and Oleg Skulkin aiming on collecting all most interesting and important cyber and digital forensics news, articles, presentations, and so on, in one place.

Popular Posts

Open Sourcing JA3: SSL/TLS Client Fingerprinting for Malware Detection

October 20, 2017

Cloud Forensics: Analyzing MEGASync

April 15, 2018

Windows Phone Physical Imaging Without JTAG and Chip-off

June 3, 2018

Timeline

  • March 4, 2021

    Find out what happened during a ransomware attack on computer

  • January 24, 2021

    Analyzing videos with multiple video streams in digital forensics

  • December 19, 2020

    PC3000 Portable III in Digital Forensics

  • December 18, 2020

    How to analyze different types of devices and find connections between them

  • July 5, 2020

    Threat Hunting: What it Is, and What it Is Not

CyberForensicator.com © Copyright 2016-2021, All Rights Reserved

Login

Welcome!Log into your account