Tool for analyzing, reverse engineering and extracting firmware images.
Program that extracts features such as email addresses, credit card numbers, URLs, and other types of information from digital evidence files.
Collection of tools for reading and writing EWF files.
Recover files using their headers, footers, and data structures.
FTK® Imager is a data preview and imaging tool that lets you quickly assess electronic evidence to determine if further analysis.
Recover lost files from harddisk, digital camera and cdrom.
Recover files using a header/footer database.
Steganography brute-force utility to uncover hidden data inside files.
Steganography program that is able to hide data in various kinds of image- and audio-files.
Stegseek is a lightning fast steghide cracker that can be used to extract hidden data from files. It is built as a fork of the original steghide project and, as a result, it is thousands of times faster than other crackers and can run through the entirety of rockyou.txt* in under 2 seconds.
Stegsolve is a stegano solver for challenges.
A simple forensics tool with command line interface that lets you keep track of USB device artifacts (i.e., USB event history) on Linux machines.
A memory forensics analysis platform.
Scan and decode bar codes (QR) from one or more image files.