Skip to content

ademboukabes/forensics-toolkit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 

Repository files navigation

Forensics Automation Toolkit

Python License Status

A comprehensive Python-based toolkit designed to automate common forensics tasks across Disk, Network, Memory, and Steganography domains. Built for CTFs (Capture The Flag) and initial DFIR (Digital Forensics and Incident Response) investigations.

Goal:

  • Automate standard forensic analysis steps.
  • Accelerate CTF problem solving.
  • Generate actionable reports.
  • Demonstrate structured analysis logic.

Project Structure

forensics-automation-toolkit/
│
├── automation-scripts/      # Core logic scripts
│   ├── disk/                # Disk forensics (file type, strings, exif)
│   ├── network/             # Network forensics (pcap analysis)
│   ├── memory/              # Memory forensics (volatility3 wrapper)
│   └── steganography/       # Steganography tools wrapper
│
├── samples/                 # Directory to store sample files for testing
├── reports/                 # Generated analysis reports
├── requirements.txt         # Python dependencies
└── README.md                # Project documentation

Getting Started

Prerequisites

  • Python 3.8+
  • External Tools: Ensure the following are installed and in your PATH:
    • file (Linux/Unix)
    • strings (Linux/Unix)
    • exiftool
    • binwalk
    • foremost
    • steghide
    • vol (Volatility 3) or aliased appropriate command

Installation

  1. Clone the repository:

    git clone https://github.com/ademboukabes/forensics-toolkit.git
    cd forensics-toolkit
  2. Install Python dependencies:

    pip install -r requirements.txt

Usage

1️ Disk Forensics

Analyzes files for type, hashes, strings, and metadata.

python automation-scripts/disk/disk_scan.py <path_to_image_or_file>

2️ Network Forensics

Parses PCAP files for traffic summary and credentials.

python automation-scripts/network/pcap_scan.py <path_to_pcap>

3️ Memory Forensics

Automates Volatility 3 plugins (pslist, netscan, cmdline).

python automation-scripts/memory/memory_scan.py <path_to_memory_dump>

4️ Steganography

Checks for hidden data using strings, exiftool, binwalk, and steghide.

python automation-scripts/steganography/stego_scan.py <path_to_image>

Features

Module Features Tools Used
Disk File type, SHA256, Strings, EXIF file, strings, exiftool
Network Traffic summary, Auth headers, DNS pyshark
Memory Processes, Network, Commands volatility3
Stego Metadata, Hidden binaries, Pass-less extract binwalk, steghide, strings

Roadmap

  • Unified CLI:Single forensic.py entry point.
  • JSON Reports: Standardized output format for easy parsing.
  • Suspect Scoring: Automated "suspiciousness" rating.
  • GUI: Graphical interface using Tkinter or web-based.

Contributing

Contributions are welcome! Please feel free to submit a Pull Request.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages