ββββ β β ββ βββ βββ ββββββ ββββββ ββββββ
ββ ββ β ββ ββββββββ ββββ βββ β ββ β ββββ ββ
βββ ββ ββββββ ββββββββ ββββ β ββββ ββββ βββ β
ββββ ββββββββ ββββββββ ββββ β ββββββ β ββββ ββββ
ββββ ββββββββββββ βββββββββββββββββββββββββββββββββ βββββ β
β ββ β β ββββ β β β βββ ββ βββ ββ βββ β βββ ββ ββ ββ β β
β β β β β β β β β
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
βββββββββββββββ F O R E N S I C S ββββββββββββββββββββββββββ
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
bad-antics
π Join discord.gg/killers for premium features!
| Tool | Language | Description | Free | Premium |
|---|---|---|---|---|
| memhunter | Rust | Memory analysis & extraction | β | π₯ |
| filecarve | Zig | High-speed file recovery | β | π₯ |
| timeliner | Rust | Forensic timeline generator | β | π₯ |
| hasher | Rust | Recursive hash verification | β | π₯ |
| peanalyze | Python | PE/ELF malware triage | β | π₯ |
| regparse | Rust | Windows registry parser | β | π₯ |
nullsec-forensics/
βββ rust/
β βββ memhunter/ # Memory forensics
β βββ timeliner/ # Timeline generation
β βββ hasher/ # File hashing
β βββ regparse/ # Registry parsing
βββ zig/
β βββ filecarve/ # File carving
β βββ diskimage/ # Disk imaging
βββ python/
β βββ peanalyze.py # PE analysis
β βββ elfparse.py # ELF analysis
β βββ yara_scan.py # YARA scanning
β βββ strings_plus.py # Enhanced strings
βββ scripts/
βββ acquire.sh # Evidence acquisition
βββ report.py # Report generation
Features:
- Process memory dumping
- String extraction with encoding detection
- Pattern/regex searching
- Credential extraction (LSASS, browsers)
- Rootkit detection signatures
# Dump process memory
sudo ./memhunter -p 1234 -o dump.bin
# Search for patterns
./memhunter -i dump.bin -s "password" --context 50
# Extract strings
./memhunter -i dump.bin --strings -e utf16 -o strings.txt
# Hunt for credentials
sudo ./memhunter --creds -o credentials.jsonSupported formats:
- Images: JPEG, PNG, GIF, BMP, TIFF
- Documents: PDF, DOCX, XLSX, PPTX
- Archives: ZIP, RAR, 7Z, TAR
- Media: MP3, MP4, AVI, MKV
- Databases: SQLite, MySQL dumps
# Carve from disk image
./filecarve -i disk.dd -o recovered/ --all
# Specific file types
./filecarve -i disk.dd -o recovered/ -t jpeg,pdf,docx
# Raw device (requires root)
sudo ./filecarve -i /dev/sda -o recovered/ -t all# Memory acquisition
sudo ./memhunter --acquire -o memory.raw
# Analyze memory dump
./memhunter -i memory.raw --processes
./memhunter -i memory.raw --network
./memhunter -i memory.raw --strings -o strings.txt
# File carving
./filecarve -i evidence.dd -o recovered/
# Generate timeline
./timeliner -i evidence.dd -o timeline.csv
# Hash verification
./hasher -d /evidence -a sha256 -o hashes.txt
./hasher --verify hashes.txtFor authorized forensic investigations only. Follow proper chain of custody procedures.