HxD |
|
Fast hex editor which, additionally to raw disk editing and modifying of main memory (RAM), handles files of any size |
|
VS Code |
|
This is properly one of the most advanced editors out there today with great OS support and customization |
|
Audacity |
|
Audio editor for Windows, Mac or Linux |
|
MP3Stego |
|
Hide information in MP3 files during the compression process |
|
Ffmpeg |
|
A complete, cross-platform solution to analyse, record, convert and stream audio and video |
|
TrID |
|
Utility designed to identify file types from their binary signatures |
|
PE Explorer |
|
Open, view and edit a variety of different 32-bit Windows executable file types |
|
Dllinjector |
|
Implement various DLL injection techniques
that work across multiple Windows versions |
|
CFF Explorer |
|
Full support for PE32/64, process viewer, .NET, rebuilder, hex, import adder, signature scanner, signature manager, extension support, scripting, disassembler, dependency walker |
|
ResourcesExtract |
|
Small utility that scans dll/ocx/exe files and extract all resources (bitmaps, icons, cursors, AVI movies, HTML files, and more...) |
|
Autopsy |
|
Autopsy is the premier end-to-end open source digital forensics platform |
|
WinDbg |
|
The Windows Debugger (WinDbg) can be used to debug kernel-mode and user-mode code, analyze crash dumps, and examine the CPU registers while the code executes |
|
FTK Imager |
|
Obtaining forensic images of computer data, without making changes to the original evidence. Works with many file systems and virtual image types |
|
Tor Browser |
|
Protect yourself against tracking, surveillance, and censorship. Always have the Tor browser installed, it's just a must :) |
|
SDRSharp |
|
SDR software for Airspy and RTL-SDR dongles and HackRF/AirSpy/USRP! The best Windows SDR software out there |
|
LINQPad |
|
LINQPad is not just for LINQ queries, but any C#/F#/VB expression, statement block or program |
|
Cheat-engine |
|
Cheat Engine. A development environment focused on modding. Wont recommend it due to suspicious addsense usage but a good starting point for editing live memory space on windows. |
|
Hetty |
|
Hetty is an HTTP toolkit for security research. It aims to become an open source alternative to commercial software like Burp Suite Pro, with powerful features tailored to the needs of the infosec and bug bounty community |
|
VirtualBox |
|
VirtualBox is a powerful x86 and AMD64/Intel64 virtualization product for enterprise as well as home use. Can read raw images, img, iso, vmdk, vdi, vhdx, vpc, vm ware images and qemu qcow - qcow2 |
|
QEMU |
|
QEmu is a powerful generic and open source machine emulator and virtualizer. Can read raw images, img, iso, vmdk, vdi, vhdx, vpc, vm ware images and qcow + qcow2 + coop |
|
DumpIt |
|
Windows Utility is used to generate a physical memory dump of Windows machines. It works with both x86 (32-bits) and x64 (64-bits) machines. |
|
Dumpzilla |
|
Dumpzilla application is developed in Python 3.x and has as purpose extract all forensic interesting information of Firefox, Iceweasel and Seamonkey browsers to be analyzed. |
|
Qemu-img |
|
qemu-img allows you to create, convert and modify images offline. It can handle all image formats supported by QEMU. Raw images, img, iso, vmdk, vdi, vhdx, vpc, vm ware images and qcow + qcow2 + coop. |
|
Vbox-img |
|
vbox-img allows you to create, convert and modify images offline. It can handle all image formats supported by QEMU. Raw images, img, iso, vmdk, vdi, vhdx, vpc, vm ware images and qcow + qcow2 + coop. |
|
Docker |
|
Docker Engine is the industry’s de facto container runtime that runs on various Linux (CentOS, Debian, Fedora, Oracle Linux, RHEL, SUSE, and Ubuntu) and Windows Server operating systems images |
|
FireEye Redline |
|
Redline, FireEye's premier free endpoint security tool, provides host investigative capabilities to users to find signs of malicious activity through physical raw memory dump and file analysis |
|
Volatility3 |
|
Volatility3 (python3) is the world's most widely used framework for extracting digital artifacts from volatile raw physical memory (RAM) dump and samples. The extraction techniques are performed completely independent of the system being investigated |
|
XorFiles |
|
Raid 5 - restore disks from other raid disks via XOR operation. Note this is just a simple xor between two files. |
|