Forensic Tools & Applications

The forensic lab VM is equipped with many commonly used forensic tools that are either open source, free or licensed. You will be able to complete the investigations given the tools provided. Tools are either installed on the Windows VM itself, located in the C:\Tools folder or installed within the Ubuntu subsystem for Linux.

Note: We are open to requests for adding tools if licensing requirements can be accommodated.

Tools Available

Tool Name File Path / Launch Method Category Description
7-Zip Desktop Shortcut (Installed) File Archiving Opens and extracts archives like ZIP, RAR, and forensic image formats.
Autopsy Desktop Shortcut (Installed) GUI Forensics Suite A digital forensics platform for hard drive investigation.
Event Log Explorer Desktop Shortcut (Installed) Event Log Analysis GUI tool to view and analyze Windows Event Logs.
Notepad++ Desktop Shortcut (Installed) Text Editing Lightweight editor for viewing and editing text files.
Visual Studio Code Desktop Shortcut (Installed) Text/Code Editing Editor useful for viewing logs, code, or scripts.
Exterro FTK Imager Desktop Shortcut (Installed) Disk Imaging Creates forensic images of drives and folders, with preview capabilities.
Arsenal Image Mounter C:\Tools\Arsenal-Image-Mounter Disk Mounting Mounts forensic images as local disks.
BrowsingHistoryView C:\Tools\browsinghistoryview-x64 Browser Artifact Analysis Used for analysis of browser history data.
CyberChef C:\Tools\CyberChef_v10.4.0\CyberChef.html Data Transformation Encoding, decoding, and data parsing tool.
DB Browser for SQLite C:\Tools\DB.Browser.for.SQLite-v3.13.1-win64 Database Analysis Used to analyze and query SQLite databases e.g. for browsers.
EZ Tools (Eric Zimmerman) C:\Tools\EZTools Artifact Analysis Parses common Windows forensic artifacts.
Hayabusa C:\Tools\hayabusa-3.2.0-win-x64 Log Analysis Parses and analyzes Windows Event Logs.
Hindsight C:\Tools\Hindsight Browser Artifact Analysis Analyzes Chrome browser artifacts.
KAPE C:\Tools\KAPE Triage Collection Collects and parses forensic artifacts.
RegRipper C:\Tools\RegRipper Registry Analysis Parses and analyzes Windows registry hives.
Sysinternals Suite C:\Tools\SysinternalsSuite Live Analysis Tools Tools for system monitoring and diagnostics.
YARA C:\Tools\yara-v4.5.2-2326-win64 Malware Detection Matches patterns in files to identify malware.
SIDR C:\Tools\SIDR Search Index DB Reporter (SIDR) Parses ESE databases (Windows.edb) and SQLite databases (Windows.db)
Google DriveFS Forensic Extractor & Metadata Exporter C:\Tools\drivefs_forensic_extractor-1.0.0 Google Drive Artifact Analysis Forensic tool for extracting and analyzing Google DriveFS cached files and metadata.
Plaso log2timeline.py psort.py psteal.py via Ubuntu WSL Timeline Analysis Creates super timelines from forensic artifacts.
Volatility 3 vol via Ubuntu WSL Memory Forensics Framework for analyzing memory dumps.