List of digital forensics tools explained

During the 1980s, most digital forensic investigations consisted of "live analysis", examining digital media directly using non-specialist tools. In the 1990s, several freeware and other proprietary tools (both hardware and software) were created to allow investigations to take place without modifying media. This first set of tools mainly focused on computer forensics, although in recent years similar tools have evolved for the field of mobile device forensics. This list includes notable examples of digital forensic tools.

Forensics-focused operating systems

Debian-based

Ubuntu-based

Gentoo-based

Computer forensics

See main article: Computer forensics.

NamePlatformLicenseVersionDescription
Windows,, 4.20 A digital forensics platform and GUI to The Sleuth Kit
Windows proprietary n/a A suite of tools for Windows developed by Microsoft
Unix-like/Windows 1.3 Framework and user interfaces dedicated to digital forensics
Windows, macOS proprietary 1435 Set of tools for encrypted systems & data decryption and password recovery
Windows proprietary 21.1 CE Digital forensics suite created by Guidance Software
Windows proprietary 8.0 Multi-purpose tool, FTK is a court-cited digital investigations platform built for speed, stability and ease of use.
Windows proprietary 5.3 Essential light weight tool to inspect any type data carrier, supporting a wide range of file systems, with advanced export functionality.
Netherlands Forensic Institute / Xiraf / HANSKENn/a proprietary n/a Computer-forensic online service.
Linux 2.3.0 Computer forensics framework for CF-Lab environment
proprietary 2.0 GUI for The Sleuth Kit
1.19 A suite of programs for Unix analysis
Unix-like/Windows 4.12.0 A library of tools for both Unix and Windows
n/a proprietary n/a Bootable operating system

Memory forensics

See main article: memory forensics. Memory forensics tools are used to acquire or analyze a computer's volatile memory (RAM). They are often used in incident response situations to preserve evidence in memory that would be lost when a system is shut down, and to quickly detect stealthy malware by directly examining the operating system and other running software in memory.

NameVendor or sponsorPlatformLicense<-- Please only include tools that either a) have a stable, sourced Wikipedia article OR b) are cited from a reliable, independent (i.e. not the company website) source -->
Volatile Systems Windows and Linux free (GPL)
BlueRISC Windows proprietary

Mobile device forensics

See main article: mobile device forensics. Mobile forensics tools tend to consist of both a hardware and software component. Mobile phones come with a diverse range of connectors, the hardware devices support a number of different cables and perform the same role as a write blocker in computer devices.

NamePlatformLicenseVersionDescription
Cellebrite UFEDWindows proprietary Hardware/software package, specializes in mobile forensic extraction
Windows proprietary Hardware/software package, specializes in deleted data

Software forensics

See main article: software forensics. Software forensics is the science of analyzing software source code or binary code to determine whether intellectual property infringement or theft occurred. It is the centerpiece of lawsuits, trials, and settlements when companies are in dispute over issues involving software patents, copyrights, and trade secrets. Software forensics tools can compare code to determine correlation, a measure that can be used to guide a software forensics expert.

Other

NamePlatformLicenseVersionDescription<-- Please only include tools that either a) have a stable, sourced Wikipedia article OR b) are cited from a reliable, independent (i.e. not the company website) source -->
Windows free n/a Tool which automatically executes a set of user defined actions on detecting Microsoft's COFEE tool
Windows proprietary 6.03 Anti-forensics software, claims to delete files securely
Windows free n/a Database application for storing file hash signatures

See also

Notes and References

  1. Web site: Kali Linux Has Been Released!. 12 March 2013. 18 March 2013. https://web.archive.org/web/20130509043312/http://www.offensive-security.com/kali-distribution/kali-linux-released/. 9 May 2013. live.
  2. Web site: Pentoo 2015 – Security-Focused Livecd based on Gentoo. 1 July 2018. https://web.archive.org/web/20180701164934/https://www.kitploit.com/2015/09/pentoo-2015-security-focused-livecd.html. 1 July 2018. live.