A comprehensive Python-based toolkit designed to automate common forensics tasks across Disk, Network, Memory, and Steganography domains. Built for CTFs (Capture The Flag) and initial DFIR (Digital Forensics and Incident Response) investigations.
- Automate standard forensic analysis steps.
- Accelerate CTF problem solving.
- Generate actionable reports.
- Demonstrate structured analysis logic.
forensics-automation-toolkit/
│
├── automation-scripts/ # Core logic scripts
│ ├── disk/ # Disk forensics (file type, strings, exif)
│ ├── network/ # Network forensics (pcap analysis)
│ ├── memory/ # Memory forensics (volatility3 wrapper)
│ └── steganography/ # Steganography tools wrapper
│
├── samples/ # Directory to store sample files for testing
├── reports/ # Generated analysis reports
├── requirements.txt # Python dependencies
└── README.md # Project documentation
- Python 3.8+
- External Tools: Ensure the following are installed and in your PATH:
file(Linux/Unix)strings(Linux/Unix)exiftoolbinwalkforemoststeghidevol(Volatility 3) or aliased appropriate command
-
Clone the repository:
git clone https://github.com/ademboukabes/forensics-toolkit.git cd forensics-toolkit -
Install Python dependencies:
pip install -r requirements.txt
Analyzes files for type, hashes, strings, and metadata.
python automation-scripts/disk/disk_scan.py <path_to_image_or_file>Parses PCAP files for traffic summary and credentials.
python automation-scripts/network/pcap_scan.py <path_to_pcap>Automates Volatility 3 plugins (pslist, netscan, cmdline).
python automation-scripts/memory/memory_scan.py <path_to_memory_dump>Checks for hidden data using strings, exiftool, binwalk, and steghide.
python automation-scripts/steganography/stego_scan.py <path_to_image>| Module | Features | Tools Used |
|---|---|---|
| Disk | File type, SHA256, Strings, EXIF | file, strings, exiftool |
| Network | Traffic summary, Auth headers, DNS | pyshark |
| Memory | Processes, Network, Commands | volatility3 |
| Stego | Metadata, Hidden binaries, Pass-less extract | binwalk, steghide, strings |
- Unified CLI:Single
forensic.pyentry point. - JSON Reports: Standardized output format for easy parsing.
- Suspect Scoring: Automated "suspiciousness" rating.
- GUI: Graphical interface using Tkinter or web-based.
Contributions are welcome! Please feel free to submit a Pull Request.