A repo of utilities built over some period for forensics, anti-forensics, security and analytical purposes
- Make sure you have latest build of go, libpcap & git installed
git clone https://github.com/gaurav-gogia/dfis-utils
- Run
dfis -h
binary from$GOPATH/bin/
If you are new to Go programming but are still interested then that is also totally fine.
Just create an issue or comment on one that you wish to work with and we'll see what can be done. I'm just trying to be as inclusive as possible here :)
Go is amazing language yet simple language and you should definitely have it in your skill-set! Want to know why it makes a great choice? Read here.
Checkout Contribution Guidelines, this should help you get started! Please send all future PRs to our dev branch
- Versatile: A number of different tools for your kit
- Brevity: Avoids filling console with too many error logs
- Clean: Easy to read, millimalistic code
- Fast: Multi-threaded tools, making them quick & efficient
Listing utilities with their respective descriptions.
Name | Description |
---|---|
Network Utilities | A set of tools for network monitoring, intel gathering etc. |
Disk/File Utilities | Small forensic utilities for disk forensic operations |
Packet Level Utilities | Tools for saving, capturing and decoding raw network packets |
Cryptographic Utilities | A set of cryptographic utilities like hashing, csprn generation etc. |
Web Utilities | A set of web crawling, osint and pentesting utilities |
===================================================================================
Network utilities are software utilities designed to analyze and configure various aspects of computer networks. The majority of them originated on Unix systems, but several later ports to other operating systems exist. The most common tools (found on most operating systems) include: 1. ping, ping a host to check connectivity (reports packet loss and latency, uses ICMP). 2. traceroute, shows the series of successive systems a packet goes through en route to its destination on a network. It works by sending packets with sequential TTLs which generate ICMP TTL-exceeded messages from the hosts the packet passes through. 3. ipconfig / ifconfig, The ipconfig command is used on Windows, while the ifconfig command is used on Linux, Mac OS X, and other Unix-like operating systems. These commands allow you to configure your network interfaces and view information about them.
| Web Utilities |
There are two categories of web utilities:
Plug-ins:
~Programs that automatically load and operate as part of your browser.
~Many web sites require plug-ins for users to fully experience web page contents.
~Some widely used plug-ins are:
# Shockwave
# Quicktime
Helper Applications (add-ons)
~Independent programs that can be executed or launched from your browser.
~Four types of helper applications are:
* Off-line browsers
~automatically connects you to selected web sites
~downloads HTML documents
~saves them to your hard disk
~documents can be read later without connecting to the Internet
~Example:
# FlashSite
* Information pushers
~automatically gathers information on topics areas (channels)
~sends them to your hard disk
~information can be read later without being connected to the Internet
~Examples:
# PointCast
# Backweb
* Off-line search utilities
~automatically submits your search request to several search engines.
~receives the results, sorts them, eliminate duplicates
~Examples:
#Metacrawler
#Dogpile