Newest Listing

Top Rated

Most Popular

Forensic ToolsRSS

Add your listing here

Forensic Tools

 These are tools for analyzing a breach in security in some way.  Typically they are used for collecting data about the breach after the fact, or analyzing software to see how it performs the attack.  Many reverse engineering tools will be listed here, as well as forensic recovery tools.

 

Other information about Forensic Tools

 

Visit the Product Site

Do you need to analyze multiple variations of essentially the same program ? Do you need to understand the changes between two versions of a program ? Are you trying to detect code theft ? SABRE BinDiff uses a unique graph-theoretical approach to allow co ...

VendorZynamix GmbH
Pricing ModelCommercial
Modified

Visit the Product Site

DEFT Linux 6 is based on the new Kernel 2.6.35 (Linux side) and the DEFT Extra 3.0 (Computer Forensic GUI) with the best freeware Windows Computer Forensic tools. DEFT it’s a new concept of Computer Forensic live system that use LXDE as desktop environmen ...

VendorDEFT Linux
Pricing ModelOpen Source
ModifiedNever
Simple Carver Suite

Visit the Product Site

Simple Carver Suite is a collection of unique tools designed for a number of purposes including but not limited to forensic computing, data recovery and eDiscovery. Simple Carver originally began as a single data recovery tool, a basic file carver which h ...

VendorFilesig Software Solutions
Pricing ModelCommercial
Modified

Visit the Product Site

AIR is a GUI front-end to dd/dc3dd designed for easily creating forensic images. by Steve Gibson and Nanni Bassetti Features: * auto-detection of IDE and SCSI drives, CD-ROMs, and tape drives * choice of using either dd or dc3dd (Note: dc3d ...

VendorOpen Source
Pricing ModelOpen Source
ModifiedNever

Visit the Product Site

The Autopsy Forensic Browser is a graphical interface to the command line digital investigation tools in The Sleuth Kit. Together, they allow you to investigate the file system and volumes of a computer. They can analyze Windows and UNIX disks and file s ...

VendorBrian Carrier
Pricing ModelOpen Source
ModifiedNever

Visit the Product Site

A Recycle Bin Forensic Analysis Tool. Many important files within Microsoft Windows have structures that are undocumented. One of the principals of computer forensics is that all analysis methodologies must be well documented and repeatable, and they m ...

VendorMcAfee
Pricing ModelFreeware
Modified

Visit the Product Site

Scalpel is a fast file carver that reads a database of header and footer definitions and extracts matching files from a set of image files or raw device files. Scalpel is filesystem-independent and will carve files from FATx, NTFS, ext2/3, or raw partitio ...

VendorGolden G. Richard III
Pricing ModelFreeware
Modified

Visit the Product Site

log2timeline is a framework for automatic creation of a super timeline. The main purpose is to provide a single tool to parse various log files and artifacts found on suspect systems (and supporting systems, such as network equipment) and produce a timeli ...

VendorKristinn Gudjonsson
Pricing ModelFreeware
ModifiedNever

Visit the Product Site

SkypeAlyzer Analyse Skype chat logs, contacts lists, SMS messages with SkypeAlyzer a forensics tool designed to work with both the old Skype database files – found in a series of .dbb files and the newer Skype database files (main.db). Use Skype ...

VendorSanderson Forensics Ltd.
Pricing ModelCommercial
ModifiedNever

Visit the Product Site

Curuncula is a tool shipped as a loadable kernel module that aims to detect rootkits based on the Intel debugging support facilities. Rootkits that set the GD access flag are also detected. It makes use of the "last branch recording" mechanism provided by ...

VendorGiuseppe Cocomazzi
Pricing ModelOpen Source
ModifiedNever

Visit the Product Site

The standard in low-level applications for forensics and recovery has always been ByteBack. Now with version 4, we're even better. The addition of UDMA, ATA & SATA support, with memory management and greater ease and control of Partition and MBR manipulat ...

VendorTech Assist, Inc
Pricing ModelCOMMERCIAL
Modified

Visit the Product Site

History Reader reads all information in the complete history database and presents you a list, either in chronological or alphabetical order. Furthermore, you can open any URL in Internet Explorer ?, add URLs to Favorites, copy URLs, print out or save the ...

VendorWolfgang Baudisch
Pricing ModelSHAREWARE
Modified

Visit the Product Site

CD/DVD Inspector reads all major CD and DVD filesystem formats including ISO-9660, Joliet, UDF, HFS and HFS+. When the disc being examined contains more than a single filesystem, all filesystems found are displayed. Multiple filesystems are present for hy ...

VendorArrowkey, Inc.
Pricing ModelCOMMERCIAL
Modified

Visit the Product Site

Provides over two dozen indexed and unindexed text search options for all popular file types. Supports full-text as well as field searching in all supported file types. Has multiple relevancy-ranking and other search sorting options. dtSearch can instantl ...

VendordtSearch Corp.
Pricing ModelCOMMERCIAL
Modified

Visit the Product Site

Hackman 7 is a freeware hex editor and disassembler. It comes with cryptography capabilities, decoding with ready and self-made algorithms and a fully-featured editor. You can edit virtually any file, disk, ZIP drive, Ram Drive, Smart Media, Compact Flash ...

VendorTechnoLogismiki
Pricing ModelSHAREWARE
Modified

Visit the Product Site

The Hex Workshop Hex Editor is a set of hexadecimal development tools for Microsoft Windows, combining advanced binary editing with the ease and flexibility of a word processor. With Hex Workshop you can edit, cut, copy, paste, insert, and delete hex, pri ...

VendorBreakPoint Software, Inc.
Pricing ModelCOMMERCIAL
Modified

Visit the Product Site

Note: 10-12-2010 I have decided to release my old program KaZAlyser as unsupported software as I still get the very occasional request for it. KaZAlyser is the successor to the popular P2PView KaZaA/Morpheus database viewer. KaZAlyser provides signifi ...

VendorSanderson Forensics Limited
Pricing ModelFreeware
Modified

Visit the Product Site

Keep this life-saving tool handy to recover forgotten passwords quickly whenever needed. Key Benefits * 7 password recovery modules for MS Word, Excel, Windows, Outlook Express, and more, combined in one tool * Instantly previews password-p ...

VendorPassware
Pricing ModelCommercial
Modified

Visit the Product Site

Using Secret Explorer you will be able to locate hidden information in any Windows-based system. This includes form AutoComplete data offered by Internet Explorer every time you enter something into an form on a web page; various Internet passwords: passw ...

VendorLastBit Software
Pricing ModelCOMMERCIAL
Modified