![](https://static.wixstatic.com/media/11062b_2ccb88c1c6de4151b51879d6c90fca9df000.jpg/v1/fill/w_288,h_162,al_c,q_80,usm_0.66_1.00_0.01,blur_2,enc_avif,quality_auto/11062b_2ccb88c1c6de4151b51879d6c90fca9df000.jpg)
![shutterstock_1902760141.jpg](https://static.wixstatic.com/media/5fb032_33e41fcd8ee14fdb9ca84a8b10f829cf~mv2.jpg/v1/fill/w_111,h_56,al_c,q_80,usm_0.66_1.00_0.01,blur_2,enc_avif,quality_auto/5fb032_33e41fcd8ee14fdb9ca84a8b10f829cf~mv2.jpg)
Tool Library
Welcome to My Cybersecurity Tool Library—an invaluable resource created to equip you with insights into a multitude of tools. My mission is to demystify these tools, providing clarity and understanding to aid your cybersecurity journey.
​
This page serves as a comprehensive guide, featuring a curated selection of tools that cover various aspects of cybersecurity. Whether you're a novice or an expert in the field, this library offers a wealth of information to assist you in comprehending and leveraging the capabilities of these tools effectively
KAPE
![image.png](https://static.wixstatic.com/media/5fb032_87f35c8e4854410bb1c4978be6db4910~mv2.png/v1/crop/x_180,y_0,w_1041,h_788/fill/w_107,h_81,al_c,q_85,usm_0.66_1.00_0.01,blur_3,enc_avif,quality_auto/image.png)
KAPE, crafted by Eric Zimmerman, stands as a powerful, free, and versatile triage collection and post-processing tool designed to streamline forensic data gathering. (My Professional use)
Blog Link:
​
To Learn about this tool/Series of article : Click Me
Velociraptor
![Exploring Velociraptor_ A Versatile Tool for Incident Response and Digital Forensics.jpg](https://static.wixstatic.com/media/5fb032_acae3261e6194c3fb0865349518bc19d~mv2.jpg/v1/crop/x_0,y_124,w_1024,h_775/fill/w_107,h_81,al_c,q_80,usm_0.66_1.00_0.01,blur_3,enc_avif,quality_auto/Exploring%20Velociraptor_%20A%20Versatile%20Tool%20for%20Incident%20Response%20and%20Digital%20Forensics.jpg)
Velociraptor is one such tool that stands out for its unique capabilities, making it an essential part of any forensic investigator or incident responder’s toolkit. Whether you're conducting a quick compromise assessment, performing a full-scale threat hunt across thousands of endpoints, or managing continuous monitoring of a network, Velociraptor can handle it all.
​
To learn about this tool/ Series of article: Click Me
An All-in-One PowerShell Script
![Boy in mask.jpg](https://static.wixstatic.com/media/5fb032_e9cb2341ed554a8e80b436df67edff06~mv2.jpg/v1/crop/x_0,y_124,w_1024,h_775/fill/w_107,h_81,al_c,q_80,usm_0.66_1.00_0.01,blur_3,enc_avif,quality_auto/Boy%20in%20mask.jpg)
I've tried to developed a PowerShell script designed to perform an analysis of system and collect information, covering everything from basic system information to intricate details. This script outputs the collected data in a clean HTML format, making it easy to review and act upon.
Streamlining Incident analysis: An All-in-One PowerShell Script
Registry Keys and File Locations Captured by Script : Click Me
Redline
![image.png](https://static.wixstatic.com/media/5fb032_81ae041310b045cdb996c0b0a083fa04~mv2.png/v1/crop/x_100,y_0,w_357,h_326/fill/w_89,h_81,al_c,q_85,usm_0.66_1.00_0.01,blur_3,enc_avif,quality_auto/image.png)
RedLine is an advanced forensics tool designed to deeply analyze Windows systems for malicious activity. With its comprehensive suite of capabilities.
FireEye Redline: A Powerful Endpoint Investigation Tool
Cyber Triage
![image.png](https://static.wixstatic.com/media/5fb032_2aacef8287124cb1b85230873cbc87b6~mv2.png/v1/crop/x_132,y_0,w_107,h_97/fill/w_89,h_81,al_c,q_85,usm_0.66_1.00_0.01,blur_3,enc_avif,quality_auto/image.png)
Cyber triage collecting and analyzing endpoint data, it helps cybersecurity professionals quickly identify, prioritize, and respond to security incidents, enhancing overall incident management workflows.
Cyber Triage: Another Powerful Investigation tool
HayaBusa
![image.png](https://static.wixstatic.com/media/5fb032_1a847d06f49d4c6d9217484b7c767d8c~mv2.png/v1/crop/x_81,y_0,w_627,h_475/fill/w_107,h_81,al_c,q_85,usm_0.66_1.00_0.01,blur_3,enc_avif,quality_auto/image.png)
In the realm of log analysis tools, Hayabusa stands out as an indispensable asset, particularly in deep investigations following initial analyses.
Blog Link
Hayabusa: A Powerful Log Analysis Tool for Forensics and Threat Hunting: Click Here
Hayabusa.exe: Essential Commands for In-depth Log Analysis :
Log Parser
![image.png](https://static.wixstatic.com/media/a3c153_41602b53df014421ab4d75652be69f6e~mv2.jpg/v1/crop/x_386,y_0,w_2155,h_1968/fill/w_89,h_81,al_c,q_80,usm_0.66_1.00_0.01,blur_3,enc_avif,quality_auto/matt-artz-Fu2v5drnMBA-unsplash%20copy.jpg)
It supports parsing and analyzing log files from a wide range of sources such as Windows Event logs, IIS logs, CSV files, XML files, and more.
Microsoft's Log Parser
OS Forensics
![image.png](https://static.wixstatic.com/media/5fb032_a49e7ffce6444c558a93fe4682779689~mv2.png/v1/crop/x_0,y_54,w_418,h_316/fill/w_107,h_81,al_c,q_85,usm_0.66_1.00_0.01,blur_3,enc_avif,quality_auto/image.png)
This software allows professionals to delve into operating systems to gather evidence, uncover hidden data, and perform comprehensive forensic analysis.
OS Forensics by PassMark: A Game-Changer in Digital Forensics
Chainsaw
![image.png](https://static.wixstatic.com/media/5fb032_224d8330ccc34f31b8d2976ddaa0e705~mv2.png/v1/crop/x_150,y_0,w_155,h_117/fill/w_107,h_81,al_c,q_85,usm_0.66_1.00_0.01,blur_3,enc_avif,quality_auto/image.png)
Chainsaw is a command-line tool that provides a fast method of running Sigma rule detection logic over event log data to highlight suspicious entries.
Blog Link:
Chainsaw: Streamlining Log Analysis for Enhanced Security Insights: Click here
Chainsaw.exe :- commands : Click here
DensityScout
![image.png](https://static.wixstatic.com/media/5fb032_25933578dafc4a8e88d90792cb2c74ae~mv2.png/v1/crop/x_73,y_0,w_415,h_314/fill/w_107,h_81,al_c,q_85,usm_0.66_1.00_0.01,blur_3,enc_avif,quality_auto/image.png)
Specializing in the detection of common obfuscation techniques such as runtime packing and encryption,
Blog Link:
Unveiling Suspicious Files with DensityScout : Click here
Thumbcache_viewer_64
![thumbcache_viewer_64=.jpg](https://static.wixstatic.com/media/5fb032_94cc7b8cce5040aa815ef6def1ba4024~mv2.jpg/v1/crop/x_0,y_124,w_1024,h_775/fill/w_107,h_81,al_c,q_80,usm_0.66_1.00_0.01,blur_3,enc_avif,quality_auto/thumbcache_viewer_64%3D.jpg)
Thumbnail cache in Windows is an essential feature that helps speed up the display of folders by storing thumbnail images.
Blog Link:
Understanding and Managing Thumbnail Cache in Windows : Click here
Magnet Encrypted Disk Detector
![Encrypted Disk Detector.jpg](https://static.wixstatic.com/media/5fb032_fae599a8f4a340a3b92296c9734d60d6~mv2.jpg/v1/crop/x_0,y_124,w_1024,h_775/fill/w_107,h_81,al_c,q_80,usm_0.66_1.00_0.01,blur_3,enc_avif,quality_auto/Encrypted%20Disk%20Detector.jpg)
(EDDv310) is a powerful tool designed to quickly and non-intrusively check for encrypted volumes on a system..
​
Blog Link:
Exploring Magnet Encrypted Disk Detector (EDDv310) : Click here
User Activity with LastActivityView
![LastActivityView.jpg](https://static.wixstatic.com/media/5fb032_dcaf18d69703464cb8baad2439fde18c~mv2.jpg/v1/crop/x_0,y_124,w_1024,h_775/fill/w_107,h_81,al_c,q_80,usm_0.66_1.00_0.01,blur_3,enc_avif,quality_auto/LastActivityView.jpg)
LastActivityView is a free tool that collects and displays information about the recent activities on your Windows computer...
​
Blog Link:
Unveiling User Activity with LastActivityView by NirSoft : Click here
Volatility 3
![image.png](https://static.wixstatic.com/media/5fb032_cc145e9d8b954153a50fc4a26bd097a4~mv2.png/v1/crop/x_83,y_0,w_227,h_172/fill/w_114,h_86,al_c,q_85,usm_0.66_1.00_0.01,blur_3,enc_avif,quality_auto/image.png)
It's a powerful toolset designed to extract digital artifacts from volatile memory (RAM) and perform in-depth forensic investigations.
Unveiling Volatility 3: A Guide to Extracting Digital Artifacts:
​Microsoft-Extractor-Suite and Microsoft-Analyzer-Suite
![Cloud Forensic.jpg](https://static.wixstatic.com/media/5fb032_4e7b47de435846158b220d6ab6861c54~mv2.jpg/v1/crop/x_0,y_121,w_1024,h_781/fill/w_114,h_87,al_c,q_80,usm_0.66_1.00_0.01,blur_3,enc_avif,quality_auto/Cloud%20Forensic.jpg)
Microsoft-Extractor-Suite is an actively maintained PowerShell tool designed to streamline data collection from Microsoft environments, including Microsoft 365 and Azure."​
Streamlining Cloud Log Analysis with Free Tools: Microsoft-Extractor-Suite and Microsoft-Analyzer-Suite :- Click Me
Memory Forensics Using Strings and Bstrings
![Memory Forensics Using Strings and Bstrings_ A Comprehensive Guide.jpg](https://static.wixstatic.com/media/5fb032_4e285495e3c6474ab75319ffde818fcb~mv2.jpg/v1/crop/x_0,y_121,w_1024,h_781/fill/w_114,h_87,al_c,q_80,usm_0.66_1.00_0.01,blur_3,enc_avif,quality_auto/Memory%20Forensics%20Using%20Strings%20and%20Bstrings_%20A%20Comprehensive%20Guide.jpg)
Two key tools frequently used in this process are Strings and Bstrings. While both help extract readable characters from memory dumps, they offer distinct features that make them suitable for different environments..
Memory Forensics Using Strings and Bstrings: A Comprehensive Guide: Click Here
MemProcFS/MemProcFS Analyzer
![Memory Process forensic _ Comprehensive Analysis Guide.jpg](https://static.wixstatic.com/media/5fb032_5ad91ea2f901464e9df98b496c67e7a5~mv2.jpg/v1/crop/x_0,y_121,w_1024,h_781/fill/w_114,h_87,al_c,q_80,usm_0.66_1.00_0.01,blur_3,enc_avif,quality_auto/Memory%20Process%20forensic%20_%20Comprehensive%20Analysis%20Guide.jpg)
MemProcFS is a powerful memory forensics tool that allows forensic investigators to mount raw memory images as a virtual file system.
MemProcFS/MemProcFS Analyzer: Comprehensive Analysis
Guide: Click Here
NMAP
![image.png](https://static.wixstatic.com/media/5fb032_d1c5da57aaee44d4aa86c3673b2679e1~mv2.png/v1/crop/x_67,y_0,w_267,h_202/fill/w_114,h_86,al_c,q_85,usm_0.66_1.00_0.01,blur_3,enc_avif,quality_auto/image.png)
Nmap allows users to discover devices on a network, perform port scanning to determine which ports are open on target systems, and gather information about the services running on those ports.
Network Scanning with Nmap:
Suricata
![image.png](https://static.wixstatic.com/media/5fb032_c0dd0756c86d4a0db58e122b1f139f93~mv2.png/v1/crop/x_182,y_0,w_696,h_527/fill/w_114,h_86,al_c,q_85,usm_0.66_1.00_0.01,blur_3,enc_avif,quality_auto/image.png)
Suricata is an open-source Network Intrusion Detection System (NIDS), Network Security Monitoring (NSM), and Intrusion Prevention System (IPS) designed for real-time traffic analysis and security monitoring
Blog Link
Exploring Suricata: Part 1: Click here
How to Download and Start Suricata Part 2: Click here
Suricata Configuration Part 3: Click here
Suricata configurations Part 4 : Click here
CentralOps
![image.png](https://static.wixstatic.com/media/5fb032_92e4a417cfa44cc791c4f793c0151ec1~mv2.png/v1/crop/x_25,y_0,w_1151,h_871/fill/w_114,h_86,al_c,q_85,usm_0.66_1.00_0.01,blur_3,enc_avif,quality_auto/image.png)
CentralOps, a robust online suite of tools and services designed to provide a one-stop solution for gathering critical internet-related data
Unveiling the Power of CentralOps
Kansa-Master
![image.png](https://static.wixstatic.com/media/5fb032_c8b389a65de2461bbdb3a706b4cc3486~mv2.png/v1/crop/x_121,y_0,w_180,h_136/fill/w_114,h_86,al_c,q_85,usm_0.66_1.00_0.01,blur_3,enc_avif,quality_auto/image.png)
One powerful tool that exemplifies this proactive stance is Kansa, a robust data collection framework designed for incident response and threat hunting.
Power of Kansa: A Comprehensive Guide to Incident Response and Threat Hunting:
PECmd and WinPrefetchView
![image.png](https://static.wixstatic.com/media/5fb032_57bb46ba1efe4c048832c5cea928fbaf~mv2.png/v1/crop/x_217,y_0,w_840,h_636/fill/w_114,h_86,al_c,q_85,usm_0.66_1.00_0.01,blur_3,enc_avif,quality_auto/image.png)
Prefetching, a process optimizing system performance by loading data into memory before needed, generates valuable artifacts in the form of .pf files
Prefetch Analysis with PECmd and WinPrefetchView:
AppCompactCacheParser.exe/AmcacheParser.exe
![image.png](https://static.wixstatic.com/media/5fb032_fab95612a8a0402784fd1666e1f4e0ac~mv2.png/v1/crop/x_164,y_0,w_950,h_719/fill/w_114,h_86,al_c,q_85,usm_0.66_1.00_0.01,blur_3,enc_avif,quality_auto/image.png)
designed to detect and remediate program compatibility challenges that may arise when a program is launched.
Shimcache/Amcache Analysis: Tool>AppCompactCacheParser.exe/AmcacheParser.exe:
Amcache.hiv Analysis: Tool--> Registry explorer
![image.png](https://static.wixstatic.com/media/5fb032_a2cafca198504b2fb99ebd36e2729e13~mv2.png/v1/crop/x_0,y_1,w_596,h_451/fill/w_114,h_86,al_c,q_85,usm_0.66_1.00_0.01,blur_3,enc_avif,quality_auto/image.png)
we delve into the intricacies of the Amcache.hve, focusing on the InventoryApplicationFile, InventoryApplication, and InventoryDriverBinary keys.
Amcache.hiv Analysis: Tool--> Registry explorer:
Power of EvtxECmd
![image.png](https://static.wixstatic.com/media/5fb032_d695eef59a1c4bf8bdac1b60e819b539~mv2.png/v1/crop/x_111,y_0,w_295,h_223/fill/w_114,h_86,al_c,q_85,usm_0.66_1.00_0.01,blur_3,enc_avif,quality_auto/image.png)
Eric Zimmerman's EvtxECmd emerges as a game-changer, offering not just a command-line parser but a comprehensive tool for transforming, filtering, and extracting critical information from Windows event logs
Unleashing the Power of EvtxECmd: Windows Event Log Analysis:
Jump list Analysis: Tool-->JLECmd.exe
![image.png](https://static.wixstatic.com/media/5fb032_6bad9837b5504b67991044ea3384bf71~mv2.png/v1/crop/x_151,y_0,w_2258,h_1709/fill/w_114,h_86,al_c,q_85,usm_0.66_1.00_0.01,blur_3,enc_avif,quality_auto/image.png)
Jump Lists represent a dynamic feature engineered to empower users by granting them swift access to frequently or recently used items.
Blog Link:
Mastering JLECmd for Windows Jump List Forensics :- Click Me
SBECmd.exe or ShellBagsExplorer
![5fb032_e9419fcf936c4b9598271183a268027f~mv2.png](https://static.wixstatic.com/media/5fb032_907755f26f4a4ea0a26a42c347a6ddd7~mv2.jpg/v1/crop/x_362,y_0,w_1197,h_906/fill/w_114,h_86,al_c,q_80,usm_0.66_1.00_0.01,blur_3,enc_avif,quality_auto/5fb032_e9419fcf936c4b9598271183a268027f~mv2.jpg)
Shell Bags are data structures within the Windows registry that track user window viewing preferences in Windows Explorer.
Blog Link:
Unlocking ShellBags Analysis with ShellBags Explorer (SBE) / SBECmd.exe :- Click Me
WinPmem
![image.png](https://static.wixstatic.com/media/5fb032_b972968ca65f4a708db5fbbf684855b6~mv2.png/v1/crop/x_150,y_0,w_188,h_142/fill/w_114,h_86,al_c,q_85,usm_0.66_1.00_0.01,blur_3,enc_avif,quality_auto/image.png)
WinPmem is a robust memory acquisition tool designed specifically for Windows environments.
Unveiling System Secrets with WinPmem(memory acquisition tool):
RBCmd and $I_Parse
![image.png](https://static.wixstatic.com/media/5fb032_0bf27e7c3288412aa738bee62110f7e9~mv2.png/v1/crop/x_65,y_0,w_300,h_227/fill/w_114,h_86,al_c,q_85,usm_0.66_1.00_0.01,blur_3,enc_avif,quality_auto/image.png)
The recycle bin plays a significant role in forensic investigations on Windows filesystems, offering valuable insights into deleted files and user activities.
Analyzing Recycle Bin Metadata with RBCmd and $I_Parse
:- Click Me
LECmd.exe
![image.png](https://static.wixstatic.com/media/5fb032_c21ba6ebfc6241a2b9ba138777d860f5~mv2.png/v1/crop/x_0,y_12,w_1024,h_775/fill/w_114,h_86,al_c,q_85,usm_0.66_1.00_0.01,blur_3,enc_avif,quality_auto/image.png)
"During a forensic examination of a hard drive, LNK files can determine what programs and files a user were accessing on their computer."
LECmd: A Powerful Tool for Investigating LNK Files :- Click Me
Plaso/Log2Timeline
![image.png](https://static.wixstatic.com/media/5fb032_540f590c85ba4247abe6f66ebbdefeef~mv2.png/v1/crop/x_51,y_0,w_797,h_367/fill/w_114,h_52,al_c,q_85,usm_0.66_1.00_0.01,blur_3,enc_avif,quality_auto/image.png)
"Plaso is the Python-based backend engine powering log2timeline, while log2timeline is the tool we use to extract timestamps and forensic artifacts. Together, they create what we call a super timeline—a comprehensive chronological record of system activity."
A Deep Dive into Plaso/Log2Timeline Forensic (Ubuntu) :- Click Me
Running Plaso/Log2Timeline on (Windows) :- Click Me
​
File recovery : PhotoRec
![image.png](https://static.wixstatic.com/media/5fb032_c3925313ae1c4d8ebeb12404ec227e7e~mv2.png/v1/crop/x_0,y_16,w_800,h_368/fill/w_114,h_52,al_c,q_85,usm_0.66_1.00_0.01,blur_3,enc_avif,quality_auto/image.png)
"Photorec is a versatile data recovery program that reads file headers and targets various media file types"
Data Recovery and Analysis :- Click Me
​
Kernal PST and OST File Viewers
![image.png](https://static.wixstatic.com/media/5fb032_74bf36a689ef48fba16a78f8a2250863~mv2.png/v1/crop/x_0,y_72,w_459,h_211/fill/w_114,h_52,al_c,q_85,usm_0.66_1.00_0.01,blur_3,enc_avif,quality_auto/image.png)
"These tools not only simplify the extraction and viewing of data but also ensure compatibility across different file formats and versions."
Exploring PST and OST File Viewers for Forensic Analysis :- Click Me
​
MetaDiver: Forensic Analysis Tool
![metadata.jpg](https://static.wixstatic.com/media/5fb032_aa52bbb940ad4c16a15971c2ca8eb4df~mv2.jpg/v1/crop/x_0,y_276,w_1024,h_471/fill/w_114,h_52,al_c,q_80,usm_0.66_1.00_0.01,blur_3,enc_avif,quality_auto/metadata.jpg)
"MetaDiver is a powerful forensic tool designed to analyze and extract metadata from various file types.."
​
MetaDiver: A Comprehensive Forensic Analysis Tool( for metadata analysis) :- Click Me
DB Browser for Forensic Analysis
![Google, firefox, Interne explorer, edge combines.jpg](https://static.wixstatic.com/media/5fb032_b62ffa8329d942b78c592c95f1d1efbc~mv2.jpg/v1/crop/x_0,y_121,w_1024,h_781/fill/w_114,h_87,al_c,q_80,usm_0.66_1.00_0.01,blur_3,enc_avif,quality_auto/Google%2C%20firefox%2C%20Interne%20explorer%2C%20edge%20combines.jpg)
"Freely available, it has become a favorite not only for database administrators but also for forensic analysts..."
​
Power of DB Browser for Forensic Analysis :- Click Me
WinAudit Tool Overview
![Computer.jpg](https://static.wixstatic.com/media/5fb032_dcf66295c9224af9a594aafd5a1b5f45~mv2.jpg/v1/crop/x_0,y_121,w_1024,h_781/fill/w_114,h_87,al_c,q_80,usm_0.66_1.00_0.01,blur_3,enc_avif,quality_auto/Computer.jpg)
"Freely available, it has become a favorite not only for database administrators but also for forensic analystsWinAudit.exe is one such tool that delivers a detailed audit of your system, offering essential data to strengthen your cybersecurity posture."
​
WinAudit Tool Overview :- Click Me
Windows Security with Log-MD
![Ransomware.jpg](https://static.wixstatic.com/media/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.jpg/v1/crop/x_0,y_121,w_1024,h_781/fill/w_114,h_87,al_c,q_80,usm_0.66_1.00_0.01,blur_3,enc_avif,quality_auto/Ransomware.jpg)
"Log-MD is a security tool tailored for Windows systems. It audits log settings and advanced audit policy configurations, guiding users to enable and configure these settings for better security and detection.."
​
Enhancing Windows Security with Log-MD :- Click Me
Bitmap Cache Files
![Remote desktop cache.jpg](https://static.wixstatic.com/media/5fb032_3d7808285b754a30b19dbe5a6375d801~mv2.jpg/v1/crop/x_0,y_121,w_1024,h_781/fill/w_114,h_87,al_c,q_80,usm_0.66_1.00_0.01,blur_3,enc_avif,quality_auto/Remote%20desktop%20cache.jpg)
"When dealing with Remote Desktop Protocol (RDP) sessions on Windows, one of the often overlooked yet valuable artifacts is the RDP bitmap cache..."​
Analyzing and Extracting Bitmap Cache Files from RDP Sessions :- Click Me
Aurora Incident Response
![Aurora Incident Response.jpg](https://static.wixstatic.com/media/5fb032_a3ce95abec0d49019501fcf7d1d57d8f~mv2.jpg/v1/crop/x_0,y_121,w_1024,h_781/fill/w_114,h_87,al_c,q_80,usm_0.66_1.00_0.01,blur_3,enc_avif,quality_auto/Aurora%20Incident%20Response.jpg)
"While experienced teams can still thrive using traditional tools like Excel, Aurora Incident Response (Aurora IR) stands out as a fantastic free and open-source solution for those who need a more structured and user-friendly approach to investigations."​
Aurora Incident Response: A Powerful Open-Source Tool for Investigators :- Click Me
RECmd
![Registry.jpg](https://static.wixstatic.com/media/5fb032_b055a4c576f24e3e92c2126a913aad48~mv2.jpg/v1/crop/x_0,y_121,w_1024,h_781/fill/w_114,h_87,al_c,q_80,usm_0.66_1.00_0.01,blur_3,enc_avif,quality_auto/Registry.jpg)
"RECmd, a powerful command-line tool created by Eric Zimmerman, designed to automate the process of registry analysis."​
Automating Registry Analysis with RECmd :- Click Me