Digital-Forensics-Tools icon indicating copy to clipboard operation
Digital-Forensics-Tools copied to clipboard

A curated list of essential digital forensics tools used for investigation, data recovery, and security analysis. These tools help in disk forensics, memory analysis, network monitoring, malware analy...

🕵️‍♂️ Digital Forensics Tools

Digital Forensics TOols

A curated list of essential digital forensics tools used for investigation, data recovery, and security analysis. These tools help in disk forensics, memory analysis, network monitoring, malware analysis, and more.

🛠 Disk Forensics Tools

🔍 Disk Imaging & Cloning

  • Autopsy – GUI-based forensic tool for disk analysis.
  • The Sleuth Kit (TSK) – Command-line toolkit for file system forensics.
  • FTK Imager – Disk imaging and evidence collection.
  • dd (Data Dump) – CLI tool for disk cloning and imaging.
  • dcfldd – Enhanced version of dd for forensics.
  • Guymager – Fast forensic imaging tool with a GUI.

🗂 File System & Partition Analysis

🔎 Metadata & Hash Analysis

🧩 File Recovery & Carving

  • Foremost – Recover deleted files based on headers, footers, and data structures.
  • Scalpel – File carving tool for deleted file recovery.
  • Recuva – User-friendly file recovery software.

🔥 Live Disk Analysis


🧠 Memory Forensics Tools

🔍 Memory Dumping Tools

  • DumpIt – One-click RAM dumping tool for Windows.
  • WinPmem – Windows memory acquisition tool.
  • LiME – Extracts live memory from Linux systems.
  • AVML – Memory acquisition for Linux & Azure VMs.
  • OSForensics – RAM imaging and forensic analysis.

🔬 Memory Analysis Tools

  • Volatility – Open-source framework for memory analysis.
  • Volatility 3 – Python 3-based version with enhanced support.
  • Rekall – Memory forensic framework from Google.
  • MemProcFS – Mounts memory dumps as a virtual file system.
  • Redline – Analyzes memory for malware infections.

🦠 Malware & Process Analysis

  • Malfind – Detects malicious code injections.
  • YARA – Signature-based malware detection in RAM.
  • Strings – Extracts readable text from memory dumps.
  • PE-sieve – Detects injected malicious code.
  • HollowsHunter – Identifies process hollowing and malware injections.

📊 Memory Timeline & Log Analysis

  • Log2Timeline (Plaso) – Creates forensic timelines from memory artifacts.
  • Memtriage – Rapid triage tool for incident response.
  • Efilter – Query and analyze memory artifacts efficiently.

🌐 Network Forensics Tools

🔎 Packet Sniffers & Traffic Analysis

  • Wireshark – GUI-based packet analyzer for real-time network traffic analysis.
  • tcpdump – Command-line packet sniffer for capturing network packets.
  • TShark – CLI version of Wireshark for automated packet analysis.

🕵️ Intrusion Detection & Network Security Monitoring

  • Zeek (Bro) – Network traffic analysis tool for security monitoring.
  • Suricata – High-performance network IDS, IPS, and NSM tool.
  • Snort – Open-source intrusion detection and prevention system (IDS/IPS).

🛠️ Log Analysis & Network Flow Monitoring

🔓 Deep Packet Inspection & Protocol Analysis

  • NetworkMiner – Passive network traffic analyzer for extracting forensic data.
  • Xplico – Network forensic tool for reconstructing network sessions.
  • NetFlow Analyzer – Monitors and analyzes network traffic using NetFlow data.

📡 Wireless Network Forensics

  • Kismet – Wireless network sniffer and intrusion detection tool.
  • Aircrack-ng – Wi-Fi network security assessment and packet capturing.
  • WiFi Pineapple – Wireless network penetration testing and monitoring.

🖥️ Man-in-the-Middle (MitM) & Traffic Manipulation

  • ettercap – MitM attack tool for sniffing and network manipulation.
  • MITMf – Advanced framework for network traffic interception and manipulation.
  • Bettercap – Swiss army knife for network forensics, pentesting, and MitM attacks.

🏴‍☠️ Darknet & Deep Web Analysis

  • Tor – Anonymity network used for deep web forensics.
  • ONIONScan – Deep web analysis and onion service scanning.

📱 Mobile Forensics Tools

🔍 Mobile Data Extraction & Analysis

🔧 Android Forensics

  • ADB (Android Debug Bridge) – Command-line tool for interacting with Android devices.
  • Andriller – Android pattern lock cracker and data extraction.
  • AFLogical – Open-source tool for logical data extraction from Android.
  • Frida – Dynamic instrumentation tool for Android reverse engineering.
  • Drozer – Security testing framework for Android apps.
  • Apktool – Reverse engineer APK files.

🍏 iOS Forensics

🌐 Cloud & Online Data Extraction

📶 SIM & IMEI Forensics

🔍 Mobile App & Messaging Analysis


🦠 Malware Forensics Tools

🔍 1. Static Analysis Tools

  • IDA Pro – Advanced disassembler and decompiler.
  • Ghidra – Open-source reverse engineering framework.
  • Radare2 – Binary analysis and reversing tool.
  • PEStudio – Analyzes Windows executables for malware indicators.
  • Detect It Easy (DIE) – Detects compiler and packer information.

⚙️ 2. Dynamic Analysis Tools

  • Cuckoo Sandbox – Automated malware sandbox.
  • Any.Run – Interactive cloud-based malware analysis.
  • Joe Sandbox – Advanced malware sandboxing.
  • FakeNet-NG – Simulates network services to capture malware behavior.

💾 3. Memory Forensics Tools

  • Volatility – Extracts artifacts from RAM dumps.
  • Rekall – Memory forensics and incident response.
  • RAM Capturer – Captures live RAM data.

🔗 4. Malware Behavior Analysis

🛠 5. Code & String Analysis Tools

  • YARA – Rule-based malware classification.
  • Floss – Extracts obfuscated strings from malware.
  • Binwalk – Extracts and analyzes firmware.

🌍 6. Online Malware Analysis Services


☁️ Cloud Forensics Tools

🔍 Cloud Logging & Monitoring

🗂 Cloud Storage Forensics

💾 Cloud Instance & Virtual Machine Forensics

📡 Cloud Network Traffic Analysis

🔑 Cloud Identity & Access Forensics

⚠️ Cloud Incident Response


📧 Email Forensics Tools

🔍 Email Header Analysis

📨 Email Metadata Extraction

  • EmailTracer – Python tool to extract and analyze email headers.
  • ExifTool – Extract metadata from email files (.eml, .msg).
  • Xplico – Extract emails from network traffic captures.

📜 Log & Email File Analysis

🔑 Phishing & Malicious Email Investigation

  • PhishTool – Identify phishing attempts from email headers.
  • VirusTotal – Scan email attachments and URLs for malware.
  • YARA – Detect patterns in malicious emails and attachments.

🛠️ Email Data Recovery & Conversion


🌟 Let's Connect!

Hello, Hacker! 👋 We'd love to stay connected with you. Reach out to us on any of these platforms and let's build something amazing together:

🌐 Website: https://yogsec.github.io/yogsec/
📜 Linktree: https://linktr.ee/yogsec
🔗 GitHub: https://github.com/yogsec
💼 LinkedIn (Company): https://www.linkedin.com/company/yogsec/
📷 Instagram: https://www.instagram.com/yogsec.io/
🐦 Twitter (X): https://x.com/yogsec
👨‍💼 Personal LinkedIn: https://www.linkedin.com/in/cybersecurity-pentester/
📧 Email: [email protected]


☕ Buy Me a Coffee

Support Us Here: https://buymeacoffee.com/yogsec