Disk tools and Imaging
# | Name | Description | OS | Type |
|---|---|---|---|---|
1 | Autopsy | Graphical interface to the command line
digital investigation analysis tools in The
Sleuth Kit | Windows / Mac / Linux | Free |
2 | Arsenal Image Mounter | Mounts disk images as complete disks in
Windows, giving access to Volume
Shadow copies | Windows | Free/Paid |
3 | EnCaseForensic Imager | Create EnCase evidence files and EnCase logical evidence files | Windows | Paid |
4 | FAW (Forensics Acquisition of Websites ) | Browser designed to forensically capture web pages | Windows | Paid |
5 | FTK (Forensic Toolkit) Imager | Imaging tool, disk viewer and image mounter | Windows | Free |
6 | OSFMount | Mounts a wide range of disk images. Also allows creation of RAM disks | Windows | Free |
Email analysis
# | Name | Description | OS | Type |
|---|---|---|---|---|
1 | Mail Viewer | Viewer for Outlook Express, Windows Mail/Windows Live Mail, Mozilla Thunderbird message databases and single EML files | Windows | Free |
2 | OST Viewer | Open and view (not export) Outlook OST files without connecting to an Exchange server | Windows | Free |
3 | PST Viewer | Open and view (not export) Outlook PST files without needing Outlook | Windows | Free |
4 | Hunter | Lets you find email addresses in seconds | Windows | Free |
5 | Name2email | Lets you find email addresses within Gmail | Windows | Free |
6 | Email address verification | Email address verification technology from Email Hippo that connects to mailboxes and checks whether an email address exists | Windows | Free |
7 | Email Domain Health Check | The Domain Health Check will execute hundreds of domain/email/network performance tests to make sure all your systems are online and performing optimally | Windows | Free |
8 | G Suite Toolbox | Use the G Suite Toolbox to troubleshoot issues you have with G Suite services | Windows | Free |
9 | Fake Emailer | Free online fake mailer with attachments, encryption, HTML editor and advanced settings | Windows | Free |
File and Data Analysis
# | Name | Description | OS | Type |
|---|---|---|---|---|
1 | analyzeMFT | Parses the MFT from an NTFS file system allowing results to be analysed with other tools | Windows | Free |
2 | Passware Encryption Analyzer | Scans a computer for password-protected & encrypted files, reports encryption complexity and decryption options for each file | Windows | Paid |
3 | Forensic Image Viewer | View various picture formats, image enhancer, extraction of embedded Exif, GPS data | Windows | Free/Paid |
4 | Volatility | Collection of tools for the extraction of artefacts from RAM | Windows | Free |
5 | Pdfcrack | PDFCrack is a GNU/Linux (other POSIX-compatible systems should work too) tool for recovering passwords and content from PDF-files | Linux | Free |
Internet analysis
# | Name | Description | OS | Type |
|---|---|---|---|---|
1 | Browser History Capturer | Captures history from Firefox, Chrome, Internet Explorer and Edge web browsers running on Windows computers | Windows | Free |
2 | Browser History Viewer | Extract, view and analyse internet history from Firefox, Chrome, Internet Explorer and Edge web browsers | Windows | Free |
3 | Web Page Saver | Take a list of URLs and save scrolling captures (“snapshots”) of each page | Windows | Free |
4 | Nessus® Essentials | It provides high-speed, in-depth vulnerability scanning for up to 16 IP addresses per scanner. | Mac/Windows | Free |
5 | Burp | Burp Suite Professional builds on the basic toolkit provided in Burp Suite Community Edition, to give you the edge when test speed and reliability are vital to success. | Mac/Windows | Free/Paid |
6 | Social Engineer Toolkit (SET) | The Social-Engineer Toolkit (SET) is specifically designed to perform advanced attacks against the human element | Linux | Free |
7 | Google Dorks | Google Hacking Database (GHDB) | All | Free |
8 | Shodan | Search engine for Internet-connected devices | All | Free/Paid |
9 | Router Passwords | Default router passwords database | All | Free |
10 | OWASP ZAP | Automatically find security vulnerabilities in your web applications | All | Free |
11 | Dig | After clicking “Dig” the URL contains the information you have entered and can therefore be shared | All | Free |
12 | DNS Checker | Perform a quick DNS propagation lookup for any domain | All | Free |
13 | WHOIS | Whois search for Domain and IP | All | Free |
14 | Whats my IP address | Your IP address is a unique number linked to your online activity, somewhat like a return address on a letter | All | Free |
Forensic Suite
# | Name | Description | OS | Type |
|---|---|---|---|---|
1 | Kali Linux | Comprehensive penetration testing platform | Linux | Free |
2 | nMap | Utility for network discovery and security auditing | Windows | Free |
3 | NoMoreRansom | Ransomware is malware that locks your computer and mobile devices or encrypts your electronic files. When this happens, you can’t get to the data unless you pay a ransom | All | Free |
