Forensic ToolsRSS

Forensic Tools

 These are tools for analyzing a breach in security in some way.  Typically they are used for collecting data about the breach after the fact, or analyzing software to see how it performs the attack.  Many reverse engineering tools will be listed here, as well as forensic recovery tools.

 

Other information about Forensic Tools

 

SysTools Software

MailXaminer is a comprehensive email examination tool to carry out a thorough analysis of a bunch of emails and its header. With the help of this tool; forensicators can preview more than 20 email file types and perform advanced search operation within th ...

Modified
MailXaminer
Zynamix GmbH
Commercial
Pricing Model

Do you need to analyze multiple variations of essentially the same program ? Do you need to understand the changes between two versions of a program ? Are you trying to detect code theft ? SABRE BinDiff uses a unique graph-theoretical approach to allow co ...

Modified

DEFT Linux 6 is based on the new Kernel 2.6.35 (Linux side) and the DEFT Extra 3.0 (Computer Forensic GUI) with the best freeware Windows Computer Forensic tools. DEFT it’s a new concept of Computer Forensic live system that use LXDE as desktop environmen ...

ModifiedNever
Tech Assist, Inc
COMMERCIAL
Pricing Model

The standard in low-level applications for forensics and recovery has always been ByteBack. Now with version 4, we're even better. The addition of UDMA, ATA & SATA support, with memory management and greater ease and control of Partition and MBR manipulat ...

Modified
Wolfgang Baudisch
SHAREWARE
Pricing Model

History Reader reads all information in the complete history database and presents you a list, either in chronological or alphabetical order. Furthermore, you can open any URL in Internet Explorer ?, add URLs to Favorites, copy URLs, print out or save the ...

Modified
Arrowkey, Inc.
COMMERCIAL
Pricing Model

CD/DVD Inspector reads all major CD and DVD filesystem formats including ISO-9660, Joliet, UDF, HFS and HFS+. When the disc being examined contains more than a single filesystem, all filesystems found are displayed. Multiple filesystems are present for hy ...

Modified
dtSearch Corp.

Provides over two dozen indexed and unindexed text search options for all popular file types. Supports full-text as well as field searching in all supported file types. Has multiple relevancy-ranking and other search sorting options. dtSearch can instantl ...

Modified
TechnoLogismiki
SHAREWARE
Pricing Model

Hackman 7 is a freeware hex editor and disassembler. It comes with cryptography capabilities, decoding with ready and self-made algorithms and a fully-featured editor. You can edit virtually any file, disk, ZIP drive, Ram Drive, Smart Media, Compact Flash ...

Modified
BreakPoint Software, Inc.

The Hex Workshop Hex Editor is a set of hexadecimal development tools for Microsoft Windows, combining advanced binary editing with the ease and flexibility of a word processor. With Hex Workshop you can edit, cut, copy, paste, insert, and delete hex, pri ...

Modified
Sanderson Forensics Limited
Freeware
Pricing Model

Note: 10-12-2010 KaZAlyser is now unsupported software. KaZAlyser is the successor to the popular P2PView KaZaA/Morpheus database viewer. KaZAlyser provides significant enhancements to the investigation process. KaZAlyser provides the following functions ...

Modified
Commercial
Pricing Model

Keep this life-saving tool handy to recover forgotten passwords quickly whenever needed. Key Benefits 7 password recovery modules for MS Word, Excel, Windows, Outlook Express, and more, combined in one tool Instantly previews password-protected MS Wo ...

Modified
LastBit Software

Using Secret Explorer you will be able to locate hidden information in any Windows-based system. This includes form AutoComplete data offered by Internet Explorer every time you enter something into an form on a web page; various Internet passwords: passw ...

Modified
Secret Explorer
Paraben Corp
Commercial
Pricing Model

Forensically examine the most popular e-mail formats such as America Online (AOL), Outlook Exchange (PST), Eudora, and many others. Paraben's E-mail Examiner is one of the most comprehensive forensically sound e-mail examination tools available. E-mail ...

Modified
Paraben Corp.
Commercial
Pricing Model

Don't settle for half the data. Most commercial cell phone forensic software only gets logical data files. That's like doing an investigation on half a crime scene. If a tool doesn't have advanced analysis features, it's probably because they don't get ...

Modified
Mares and Company, LLC
COMMERCIAL
Pricing Model

Maresware: The Suite provides an essential set of tools for investigating computer records plus powerful data analysis capabilities. This bundled suite of over 40 separate, highly-targeted programs gives you the flexibility to accomplish a wide variety of ...

Modified
U.S. Department of Justice's National Institute of Justice (NIJ), and the National Institute of Standards and Technology (NIST)
COMMERCIAL
Pricing Model

The National Software Reference Library (NSRL) is designed to collect software from various sources and incorporate file profiles computed from this software into a Reference Data Set (RDS) of information. The RDS can be used by law enforcement, governmen ...

Modified
Tech Assist, Inc.
COMMERCIAL
Pricing Model

Hunts down information, old and new, on the user's PC. Shows you a slide show of downloaded images. Runs from the floppy drive. Takes up few resources within a network or computer system. Lets you customize the search parameters. Generates custom rep ...

Modified
New Technologies Armor, Inc
COMMERCIAL
Pricing Model

NTI's forensic software tools are used in security reviews, internal audits and computer related investigations. Some of the tools are also used to identify and eliminate sensitive data leakage in classified government agencies. They are sold separately a ...

Modified
sysinternals/Mark Russinovich
Freeware
Pricing Model

The tools included in the PsTools suite, which are downloadable individually or as a package, are: PsExec - execute processes remotely, PsFile - shows files opened remotely, PsGetSid - display the SID of a computer or a user, PsKill - kill processes by na ...

Modified

© Computer Network Defence Limited 2021