Free Resources

Our Resources

Digital Forensics Fundamentals | eSecurity Institute
Digital Forensics Fundamentals is an extensive online training program developed for professionals seeking to enter the industry or advance their career. The course will remain free in order to help newcomers to the cybersecurity industry.
Certified Computer Forensics Analyst (CCFA)
eSecurity Institute now offers the Certified Computer Forensics Analyst (CCFA) certification, a credential for professionals seeking to enhance their expertise in digital forensics.
Cybersecurity Terms
A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z A Antivirus Software Software that protects a computer or network from malicious software, such as viruses, spyware, and malware. Authentication The process of verifying

Free Digital Forensics Tools

WireShark is a free and open source network protocol analyzer. WireShark is used worldwide by a variety of security professionals in government, law enforcement, business and academia. WireShark is considered by many as the standard for network forensics tools on the market. WireShark has a rich se…
FTK Imager Download
FTK Imager is a digital forensics tool developed by Exterro. FTK Imager is a tool used for creating forensic images when examining multiple types of drives, devices and external memory sources. Creating a forensic image of a drive is an essential process in digital forensics. This allows investigato…
Autopsy: Digital Forensics - Download
Autopsy is an open source digital forensics platform used by law enforcement, military, business and academic clients. Autopsy is a feature rich platform that allows for multiple add-ons for each specific industry. Autopsy comes equipped with the capability to allow the examiner to easily investigat…
ExifTool by Phil Harvey - Download
ExifTool by Phil Harvey is an easy to use software that is designed to quickly extract metadata from a variety of multimedia file types. ExifTool reads Reads EXIF, GPS, IPTC, XMP, JFIF, MakerNotes, GeoTIFF, ICC Profile, Photoshop IRB, FlashPix, AFCP, ID3, Lyrics3 and others. The operating system all…
4Discovery: Digital Forensics Solutions
4Discovery is an organization which has designed a variety free digital forensics tools available online. Some of the tools created by 4Discovery are the MetaExtractor, USB Historian, ShellBagger and LinkParser. MetaExtractor is a software that allows investigators to quicky extact metadata from mul…
Volatility Framework Download
The Volatility Framework is an open source digital forensics software created by the Volatility Foundation. Volatility is a tool that is used for memory forensics which is an aspect of digital forensics that involves extracting and analyzing digital artifacts on information systems. Volatility is av…
DB Browser for SQLite
DB Browser for SQLite is an open source software which is used to create and edit database files that use SQLite. The tool is similar to a spreadsheet in its design and allows for the user to quickly and easily create and modify database files. Developer Website
NirSoft Utilities
NirSoft is a website that offers free open source digital forensics and cybersecurity software. NirSoft utilities include a variety of free tools that can be helpful in a digital forensics investigation. The tools developed by NirSoft include capabilities that include password recovery, network prot…
Xplico: Network Forensic Analysis Tool
Xplico is an open source network forensics tool that differs from a network protocol analyzer. Xplico extracts the contents of various file types such as HTTP, IMAP, POP and SMTP. Xplico comes with a variety of powerful features such as data reassembly, realtime elaboration and Port Independent Prot…
NetworkMiner Download
Network Miner is a Network Forensics Analysis Tool that is used to analyze packet captures and other valuable network data in an investigation. Network Miner functions as a passive network sniffer or packet capturing tool in order to detect operating systems, sessions, hostnames, open ports and more…
Thumbcache Viewer
Thumbcache Viewer is a free tool that allows the user to extract thumbnail images associated with multimedia files on a computer. In many instances multimedia files that are deleted leave a trace of their contents through a thumbnail image. These thumbnail images can be recreated and easily extracte…
Angry IP Scanner
The Angry IP Scanner is a free tool that operates on Windows, MacOS and Linux. The tool allows the user to easily scan IP addresses and ports along with other scanning features for network administration. The tool can conduct scans on local networks or over the internet. Users can scan
Ghiro: Image Forensics
Ghiro is a free tool used for image forensics. The tool allows the user to easily extract and analyze EXIF, IPTC, XMP and other forms of metadata. Ghiro also extracts GPS location data found in multimedia files. Ghiro additionally extracts thumbnail images associated with files. Download Ghiro
X-Ways: WinHex
WinHex is a hexadecimal editor which is used for a variety of data recovery and digital forensic tasks. WinHex works with CD’s, floppy disks, DVD’s, Zip files, Flash files and other multimedia files. WinHex also works with RAID systems and a variety of other dynamic file systems on the market.
OS Forensics
OS Forensics is an organization that develops free and paid digital forensics tools. OS Forensics offers four tools which can be downloaded for free on their website. The four tools are 1) OSF Mount, 2) OSF Clone, 3) Volatility Workbench and 4) Image USB. OSF Mount allows the user to
SIFT Workstation
The SIFT Workstation is a collection of digital forensic tools developed by SANS Institute. The SIFT Workstation not only provides access to digital forensic tools but also several tools used for incident response which may also be required in forensic roles. The SIFT Workstation is capable of readi…
The Sleuth Kit
The Sleuth Kit is a digital forensics toolkit that consists of a library of command line tools for examining disk images. The Sleuth Kit will allow the user to quickly and easily analyze data from a file system or volume. The Sleuth Kit can be downloaded for free from the
Foremost by SourceForge
Foremost is a digital forensics tool that allows the user to extract and analyze files using headers, footers and internal file structures known as data carving. Foremost works on a variety of file types and offers several options for filtering and searching. Foremost was originally designed for the…

Digital Forensics Resources

Wireshark User’s Guide
Gary Kessler’s File Signature Table
Gary Kessler’s file signature tool is a powerful and useful tool for data recovery and digital forensics. This tool allows users to identify and recover lost or corrupted files by analyzing the signature of the file. A file signature, also known as a magic number, is a unique sequence of
The Wayback Machine
The Wayback Machine is an internet tool that allows users to travel back in time and explore old versions of websites. It was launched in 2001 by the Internet Archive, a non-profit organization that aims to preserve digital content for future generations. The Wayback Machine works by taking periodi…
Malware Analysis Tools
Malware analysis tools list

Oxygen Forensics
Oxygen Forensics is a developer of digital forensics tools such as Oxygen Forensic Detective, Oxygen Forensic Cable Kit and Oxygen Forensic Detective Network. Oxygen Forensics tools are used by clients in government, law enforcement and the corporate sector for digital forensics and incident respons…
Cellebrite UFED
Cellebrite UFED is a world renowned mobile forensics platform used by governments, law enforcement and enterprise clients. Cellebrite allows the user to quickly extract data from smartphones, drones, SIM cards, SD cards, GPS devices, and more. Cellebrite UFED is a complete digital forensics toolkit…
Elcomsoft Forensics
Elcomsoft is a developer of digital foreniscs software for law enforcement, business and personal use. Elcomsoft provides a variety of digital forensics tools such as the Elcomsoft Mobile Forensic Bundle for Law Enforcement which costs $3,500. This tool allows for physical, logical and over the air…
Runtime Software
GetDataBack Pro is a powerful data recovery software that can recover lost data from Windows, Mac, or Linux drives. It supports various file systems including NTFS, FAT, exFAT, EXT, HFS+, and APFS. With an intuitive user interface, even inexperienced users can conduct their own data recovery. Additi…
Forensic Acquisition of Websites
Forensic Acquisition of Websites (FAW) is a tool designed to extract data from websites for forensic investigation purposes. FAW is a powerful tool that allows forensic investigators to retrieve data from web servers, web applications, and web content. It provides a user-friendly interface that enab…
Magnet AXIOM
Magnet AXIOM is a powerful digital forensics tool used by law enforcement agencies, corporate security teams, and other investigators to analyze and extract digital evidence from various devices such as smartphones, computers, and cloud services. With its advanced capabilities and intuitive user int…
C.A.I.N.E. Digital Forensics
Computer Aided Investigative Environment, or C.A.IN.E., is a powerful tool for conducting digital investigations. It is an open-source platform that is designed to provide investigators with all the necessary tools they need to conduct a thorough and efficient investigation. C.A.IN.E. is built on t…

Cybersecurity Resources

OSINT Framework
OSINT (Open Source Intelligence) Framework is a powerful and versatile tool used for conducting open-source investigations. This framework is a collection of various open-source tools that can help investigators gather information from various sources online. The OSINT Framework is an open-source p…
MITRE ATT&CK, which stands for Adversarial Tactics, Techniques, and Common Knowledge, is a framework that helps organizations understand and classify the various tactics and techniques that attackers use to compromise computer networks. Developed by MITRE, a non-profit organization that operates fed… is a comprehensive database that offers a wealth of information on Common Vulnerabilities and Exposures (CVE). The website allows users to search for CVEs by keyword, vendor, product, or CVE ID, providing detailed information about each vulnerability, including its severity, impact, a…

Free Cybersecurity Tools

Kali Linux
Kali Linux is a Debian-based operating system that is specifically designed for advanced penetration testing, digital forensics, and ethical hacking. It was developed and maintained by Offensive Security, a leading provider of information security training and penetration testing services. Kali Lin…
Metasploit is an open-source penetration testing framework that has been widely used by security professionals to simulate cyber attacks on computer systems. Developed by Rapid7, Metasploit provides a suite of tools for testing the vulnerabilities of target systems and assessing their security postu…
Burp Suite
Burp Suite is a popular tool for web application security testing, developed by PortSwigger. It is widely used by security professionals to identify and exploit vulnerabilities in web applications, as well as to automate security testing processes. Burp Suite consists of various modules that work to…
Snort IDS
Snort is a free, open-source network intrusion detection system (IDS) that monitors network traffic in real-time and alerts system administrators when it detects potential security threats. It was first developed in 1998 by Martin Roesch and has since become one of the most widely used intrusion det…

Industry Knowledge

International Organization for Standardization
We’re ISO, the International Organization for Standardization. We develop and publish International Standards.
Global Leader of Cyber Security Solutions and Services | Fortinet
Fortinet delivers award-winning cyber security solutions across the entire digital attack surface, securing devices, data, and applications from the data center to the cloud to the home office.
Cyber Security News Today | Articles on Cyber Security, Malware Attack updates | Cyware
Cyber News - Check out top news and articles about cyber security, malware attack updates and more at Our machine learning based curation engine brings you the top and relevant cyber security content. Read More!
The Hacker News | #1 Trusted Cybersecurity News Site
The Hacker News is the most trusted and popular cybersecurity publication for information security professionals seeking breaking news, actionable insights and analysis.
National Institute of Standards and Technology
NIST promotes U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve our quality of life.
General Data Protection Regulation (GDPR) Compliance Guidelines
The EU General Data Protection Regulation went into effect on May 25, 2018, replacing the Data Protection Directive 95/46/EC. Designed to increase data privacy for EU citizens, the regulation levies steep fines on organizations that don’t follow the law.
Homepage | CISA
As part of its mission, CISA leads the effort to enhance the security, resiliency, and reliability of the Nation’s cybersecurity and communications infrastructure.
Hack the Gap: Close the cybersecurity talent gap with interactive tools and data
Cybersecurity News, Awards, Webinars, eSummits, Research
The essential resource for cybersecurity professionals, delivering in-depth, unbiased news, analysis and perspective to keep the community informed, educated and enlightened about the market.

Cybersecurity Jobs

Cleared Cyber Security Jobs |
Find cleared cyber security jobs, post your cleared resume, apply for infosec jobs & register for job fairs.
Find Jobs in Technology
Search 70,000+ job openings from tech’s hottest employers. Salary estimations, career path tips and Insights to make your next career move the right one.
The Cybersecurity Job Board
The Cybersecurity Job Board is the most comprehensive source of Cybersecurity Jobs online. Find the most talented The Cybersecurity Jobs online.
Job Seeker |
Welcome to
Your job board for the best jobs and talents in InfoSec / Cybersecurity is the prime InfoSec job board serving the cyber security community with fresh career opportunities and a platform to attract great talent.

Start Learning for FREE

Get access to the latest version of Digital Forensics Fundamentals

Get Started