make icons
This commit is contained in:
@@ -461,7 +461,10 @@ document.addEventListener('DOMContentLoaded', () => {
|
||||
<div class="tool-recommendation ${tool.type === 'method' ? 'method' : hasValidProjectUrl ? 'hosted' : (tool.license !== 'Proprietary' ? 'oss' : '')}"
|
||||
onclick="window.showToolDetails('${tool.name}')">
|
||||
<div class="tool-rec-header">
|
||||
<h4 class="tool-rec-name">${tool.name}</h4>
|
||||
<h4 class="tool-rec-name">
|
||||
${tool.icon ? `<span style="margin-right: 0.5rem;">${tool.icon}</span>` : ''}
|
||||
${tool.name}
|
||||
</h4>
|
||||
<span class="tool-rec-priority ${tool.recommendation.priority}"
|
||||
style="background-color: ${priorityColors[tool.recommendation.priority]};">
|
||||
${tool.recommendation.priority}
|
||||
@@ -474,9 +477,8 @@ document.addEventListener('DOMContentLoaded', () => {
|
||||
|
||||
<div class="tool-rec-metadata">
|
||||
<div style="display: flex; flex-wrap: wrap; gap: 0.25rem; margin-bottom: 0.5rem;">
|
||||
${tool.type === 'method' ? '<span class="badge" style="background-color: var(--color-method); color: white;">Methode</span>' : ''}
|
||||
${tool.type !== 'method' && hasValidProjectUrl ? '<span class="badge badge-primary">CC24-Server</span>' : ''}
|
||||
${tool.type !== 'method' && tool.license !== 'Proprietary' ? '<span class="badge badge-success">Open Source</span>' : ''}
|
||||
${tool.knowledgebase === true ? '<span class="badge badge-error">📖</span>' : ''}
|
||||
<span class="badge" style="background-color: var(--color-bg-tertiary); color: var(--color-text);">${tool.skillLevel}</span>
|
||||
</div>
|
||||
<div style="font-size: 0.8125rem; color: var(--color-text-secondary);">
|
||||
|
||||
@@ -2,6 +2,7 @@
|
||||
export interface Props {
|
||||
tool: {
|
||||
name: string;
|
||||
icon?: string;
|
||||
type?: string;
|
||||
description: string;
|
||||
domains: string[];
|
||||
@@ -38,16 +39,18 @@ const cardClass = isMethod ? 'card card-method tool-card' :
|
||||
(tool.license !== 'Proprietary' ? 'card card-oss tool-card' : 'card tool-card');
|
||||
---
|
||||
|
||||
<div class={cardClass} onclick={`window.showToolDetails('${tool.name}')`} style="cursor: pointer; border-left: 4px solid ${isMethod ? 'var(--color-method)' : hasValidProjectUrl ? 'var(--color-hosted)' : tool.license !== 'Proprietary' ? 'var(--color-oss)' : 'var(--color-border)'};">
|
||||
<!-- Card Header with Fixed Height -->
|
||||
<div class={cardClass} onclick={`window.showToolDetails('${tool.name}')`} style="cursor: pointer; border-left: 4px solid {isMethod ? 'var(--color-method)' : hasValidProjectUrl ? 'var(--color-hosted)' : tool.license !== 'Proprietary' ? 'var(--color-oss)' : 'var(--color-border)'};">
|
||||
<!-- Card Header with Fixed Height -->
|
||||
<div class="tool-card-header">
|
||||
<h3>{tool.name}</h3>
|
||||
<div class="tool-card-badges">
|
||||
{isMethod && <span class="badge" style="background-color: var(--color-method); color: white;">Methode</span>}
|
||||
{!isMethod && hasValidProjectUrl && <span class="badge badge-primary">CC24-Server</span>}
|
||||
{!isMethod && tool.license !== 'Proprietary' && <span class="badge badge-success">OSS</span>}
|
||||
{hasKnowledgebase && <span class="badge badge-error">📖</span>}
|
||||
</div>
|
||||
<h3>
|
||||
{tool.icon && <span style="margin-right: 0.5rem; font-size: 1.125rem;">{tool.icon}</span>}
|
||||
{tool.name}
|
||||
</h3>
|
||||
<div class="tool-card-badges">
|
||||
<!-- Only show CC24-Server and Knowledgebase badges -->
|
||||
{!isMethod && hasValidProjectUrl && <span class="badge badge-primary">CC24-Server</span>}
|
||||
{hasKnowledgebase && <span class="badge badge-error">📖</span>}
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<!-- Description - Truncated to 2 lines -->
|
||||
|
||||
@@ -65,11 +65,13 @@ domains.forEach((domain: any) => {
|
||||
<div class={`collaboration-tool-compact ${hasValidProjectUrl ? 'hosted' : tool.license !== 'Proprietary' ? 'oss' : ''}`}
|
||||
onclick={`window.showToolDetails('${tool.name}')`}>
|
||||
<div class="tool-compact-header">
|
||||
<h4 style="margin: 0; font-size: 0.875rem; font-weight: 600;">{tool.name}</h4>
|
||||
<h4 style="margin: 0; font-size: 0.875rem; font-weight: 600;">
|
||||
{tool.icon && <span style="margin-right: 0.5rem;">{tool.icon}</span>}
|
||||
{tool.name}
|
||||
</h4>
|
||||
<div style="display: flex; gap: 0.25rem;">
|
||||
{hasValidProjectUrl && <span class="badge badge--mini badge-primary">CC24-Server</span>}
|
||||
{tool.license !== 'Proprietary' && <span class="badge badge--mini badge-success">OSS</span>}
|
||||
{tool.knowledgebase === true && <span class="badge badge--mini badge-error">Infos 📖</span>}
|
||||
{tool.knowledgebase === true && <span class="badge badge--mini badge-error">📖</span>}
|
||||
</div>
|
||||
</div>
|
||||
<p class="text-muted">
|
||||
@@ -249,29 +251,25 @@ domains.forEach((domain: any) => {
|
||||
const isMethod = tool.type === 'method';
|
||||
|
||||
// Update modal content
|
||||
document.getElementById('tool-name').textContent = tool.name;
|
||||
const toolNameElement = document.getElementById('tool-name');
|
||||
const iconHtml = tool.icon ? `<span style="margin-right: 0.75rem; font-size: 1.5rem;">${tool.icon}</span>` : '';
|
||||
toolNameElement.innerHTML = `${iconHtml}${tool.name}`;
|
||||
document.getElementById('tool-description').textContent = tool.description;
|
||||
|
||||
// Badges
|
||||
|
||||
// Badges - Only CC24-Server and Knowledgebase
|
||||
const badgesContainer = document.getElementById('tool-badges');
|
||||
const hasValidProjectUrl = tool.projectUrl !== undefined &&
|
||||
tool.projectUrl !== null &&
|
||||
tool.projectUrl !== "" &&
|
||||
tool.projectUrl.trim() !== "";
|
||||
|
||||
|
||||
badgesContainer.innerHTML = '';
|
||||
if (isMethod) {
|
||||
badgesContainer.innerHTML += '<span class="badge" style="background-color: var(--color-method); color: white;">Methode</span>';
|
||||
} else {
|
||||
if (hasValidProjectUrl) {
|
||||
badgesContainer.innerHTML += '<span class="badge badge-primary">CC24-Server</span>';
|
||||
}
|
||||
if (tool.license !== 'Proprietary') {
|
||||
badgesContainer.innerHTML += '<span class="badge badge-success">Open Source</span>';
|
||||
}
|
||||
// Only show CC24-Server and Knowledgebase badges
|
||||
if (!isMethod && hasValidProjectUrl) {
|
||||
badgesContainer.innerHTML += '<span class="badge badge-primary">CC24-Server</span>';
|
||||
}
|
||||
if (tool.knowledgebase === true) {
|
||||
badgesContainer.innerHTML += '<span class="badge badge-error">Infos 📖</span>';
|
||||
badgesContainer.innerHTML += '<span class="badge badge-error">📖</span>';
|
||||
}
|
||||
|
||||
// Metadata - safe array handling
|
||||
|
||||
@@ -1,5 +1,6 @@
|
||||
tools:
|
||||
- name: Autopsy
|
||||
icon: 📦
|
||||
type: software
|
||||
description: >-
|
||||
Die führende Open-Source-Alternative zu kommerziellen Forensik-Suiten mit
|
||||
@@ -35,10 +36,11 @@ tools:
|
||||
- artifact-extraction
|
||||
- keyword-search
|
||||
- name: Volatility 3
|
||||
icon: 📦
|
||||
type: software
|
||||
description: >-
|
||||
Das Schweizer Taschenmesser der Memory-Forensik, unverzichtbar für die
|
||||
Analyse von RAM-Dumps. Mit über 100 Plugins extrahiert es Prozesse,
|
||||
Das Universalwerkzeug der Live-Forensik, unverzichtbar für die Analyse von
|
||||
RAM-Dumps. Mit über 100 Plugins extrahiert es Prozesse,
|
||||
Netzwerkverbindungen, Registry-Keys und versteckte Malware aus dem
|
||||
Arbeitsspeicher. Die Python-basierte Architektur macht es flexibel
|
||||
erweiterbar, erfordert aber solide Kommandozeilen-Kenntnisse. Version 3
|
||||
@@ -71,6 +73,7 @@ tools:
|
||||
- scripting
|
||||
- process-analysis
|
||||
- name: TheHive 5
|
||||
icon: 🌐
|
||||
type: software
|
||||
description: >-
|
||||
Moderne Security-Orchestrierungs-Plattform für die koordinierte
|
||||
@@ -106,6 +109,7 @@ tools:
|
||||
- incident-tracking
|
||||
statusUrl: https://uptime.example.lab/api/badge/1/status
|
||||
- name: MISP
|
||||
icon: 🌐
|
||||
type: software
|
||||
description: >-
|
||||
Das Rückgrat des modernen Threat-Intelligence-Sharings mit über 40.000
|
||||
@@ -140,6 +144,7 @@ tools:
|
||||
- automation
|
||||
statusUrl: https://status.mikoshi.de/api/badge/34/status
|
||||
- name: Timesketch
|
||||
icon: 📦
|
||||
type: software
|
||||
description: >-
|
||||
Google's Open-Source-Lösung für kollaborative Timeline-Analyse großer
|
||||
@@ -173,6 +178,7 @@ tools:
|
||||
- correlation
|
||||
statusUrl: https://uptime.example.lab/api/badge/3/status
|
||||
- name: Wireshark
|
||||
icon: 📦
|
||||
type: software
|
||||
description: >-
|
||||
Der unangefochtene König der Netzwerk-Protokoll-Analyse mit Support für
|
||||
@@ -209,6 +215,7 @@ tools:
|
||||
- visualization
|
||||
- filtering
|
||||
- name: Magnet AXIOM
|
||||
icon: 📦
|
||||
type: software
|
||||
description: >-
|
||||
Die Rolls-Royce unter den kommerziellen Forensik-Suiten mit
|
||||
@@ -244,6 +251,7 @@ tools:
|
||||
- automated-analysis
|
||||
- reporting
|
||||
- name: Cellebrite UFED
|
||||
icon: 📦
|
||||
type: software
|
||||
description: >-
|
||||
Der Goldstandard der mobilen Forensik mit legendären
|
||||
@@ -276,6 +284,7 @@ tools:
|
||||
- hardware-interface
|
||||
- automated-analysis
|
||||
- name: Cuckoo Sandbox 3
|
||||
icon: 🌐
|
||||
type: software
|
||||
description: >-
|
||||
Die führende Open-Source-Sandbox für automatisierte Malware-Analyse in
|
||||
@@ -308,6 +317,7 @@ tools:
|
||||
- virtualization
|
||||
- automated-analysis
|
||||
- name: Ghidra
|
||||
icon: 📦
|
||||
type: software
|
||||
description: >-
|
||||
NSAs Geschenk an die Reverse-Engineering-Community als mächtige
|
||||
@@ -340,6 +350,7 @@ tools:
|
||||
- scripting
|
||||
- static-analysis
|
||||
- name: Plaso (log2timeline)
|
||||
icon: 📦
|
||||
type: software
|
||||
description: >-
|
||||
Der industrielle Staubsauger für Zeitstempel - extrahiert aus hunderten
|
||||
@@ -375,6 +386,7 @@ tools:
|
||||
- artifact-extraction
|
||||
- scripting
|
||||
- name: CyberChef
|
||||
icon: 🌐
|
||||
type: software
|
||||
description: >-
|
||||
Das digitale Schweizer Taschenmesser für Daten-Manipulation mit über 300
|
||||
@@ -407,6 +419,7 @@ tools:
|
||||
- visualization
|
||||
- parsing
|
||||
- name: Velociraptor
|
||||
icon: 🌐
|
||||
type: software
|
||||
description: >-
|
||||
Die nächste Evolution der Endpoint-Forensik mit skalierbarer
|
||||
@@ -447,6 +460,7 @@ tools:
|
||||
- hunting
|
||||
statusUrl: https://status.mikoshi.de/api/badge/33/status
|
||||
- name: GRR Rapid Response
|
||||
icon: 🌐
|
||||
type: software
|
||||
description: >-
|
||||
Googles Antwort auf Enterprise-Scale-Forensik für die Untersuchung von
|
||||
@@ -483,6 +497,7 @@ tools:
|
||||
- live-forensics
|
||||
- fleet-management
|
||||
- name: Arkime
|
||||
icon: 📦
|
||||
type: software
|
||||
description: >-
|
||||
Das Heavy-Metal-Tool für Full-Packet-Capture mit der Fähigkeit, Petabytes
|
||||
@@ -517,6 +532,7 @@ tools:
|
||||
- api
|
||||
- big-data
|
||||
- name: NetworkMiner
|
||||
icon: 📦
|
||||
type: software
|
||||
description: >-
|
||||
Der benutzerfreundliche kleine Bruder von Wireshark mit Fokus auf Forensik
|
||||
@@ -550,6 +566,7 @@ tools:
|
||||
- parsing
|
||||
- session-reconstruction
|
||||
- name: ExifTool
|
||||
icon: 📦
|
||||
type: software
|
||||
description: >-
|
||||
Der Metadaten-Maestro, der aus über 1000 Dateiformaten verborgene
|
||||
@@ -585,6 +602,7 @@ tools:
|
||||
- scripting
|
||||
- batch-processing
|
||||
- name: Chainalysis
|
||||
icon: 📦
|
||||
type: software
|
||||
description: >-
|
||||
Der Platzhirsch der Blockchain-Forensik mit Zugriff auf die größte
|
||||
@@ -616,6 +634,7 @@ tools:
|
||||
- api
|
||||
- reporting
|
||||
- name: Neo4j
|
||||
icon: 🌐
|
||||
type: software
|
||||
description: >-
|
||||
Die führende Graph-Datenbank verwandelt komplexe Beziehungsgeflechte in
|
||||
@@ -654,6 +673,7 @@ tools:
|
||||
- query-language
|
||||
statusUrl: https://status.mikoshi.de/api/badge/32/status
|
||||
- name: QGIS
|
||||
icon: 📦
|
||||
type: software
|
||||
description: >-
|
||||
Das Open-Source-GIS-Kraftpaket für die Visualisierung von Geodaten in
|
||||
@@ -687,6 +707,7 @@ tools:
|
||||
- scripting
|
||||
- reporting
|
||||
- name: Nextcloud
|
||||
icon: 🌐
|
||||
type: software
|
||||
description: >-
|
||||
Die Open-Source-Cloud-Suite als sichere Kollaborations-Zentrale für
|
||||
@@ -724,6 +745,7 @@ tools:
|
||||
- document-management
|
||||
statusUrl: https://status.mikoshi.de/api/badge/11/status
|
||||
- name: Gitea
|
||||
icon: 🌐
|
||||
type: software
|
||||
description: >-
|
||||
Das leichtgewichtige Git-Repository für die Versionierung von
|
||||
@@ -755,6 +777,7 @@ tools:
|
||||
- ci-cd
|
||||
statusUrl: https://status.mikoshi.de/api/badge/18/status
|
||||
- name: Binwalk
|
||||
icon: 📦
|
||||
type: software
|
||||
description: >-
|
||||
Der Firmware-Flüsterer, der aus IoT-Geräten und Routern ihre Geheimnisse
|
||||
@@ -786,6 +809,7 @@ tools:
|
||||
- extraction
|
||||
- scripting
|
||||
- name: LibreOffice
|
||||
icon: 📦
|
||||
type: software
|
||||
description: >-
|
||||
Die freie Office-Suite, die mehr kann als nur Berichte schreiben. Calc
|
||||
@@ -847,18 +871,8 @@ tools:
|
||||
- examination
|
||||
- analysis
|
||||
- reporting
|
||||
platforms:
|
||||
- Windows
|
||||
- macOS
|
||||
- Web
|
||||
domain-agnostic-software:
|
||||
- collaboration-general
|
||||
skillLevel: novice
|
||||
accessType: commercial
|
||||
url: https://www.office.com/
|
||||
projectUrl: ''
|
||||
license: Proprietary
|
||||
knowledgebase: false
|
||||
tags:
|
||||
- gui
|
||||
- document-creation
|
||||
@@ -866,7 +880,18 @@ tools:
|
||||
- collaboration
|
||||
- cloud-based
|
||||
- reporting
|
||||
icon: ☁️
|
||||
platforms:
|
||||
- Windows
|
||||
- macOS
|
||||
- Web
|
||||
accessType: commercial
|
||||
license: Proprietary
|
||||
knowledgebase: false
|
||||
domain-agnostic-software:
|
||||
- collaboration-general
|
||||
- name: GraphSense
|
||||
icon: 🌐
|
||||
type: software
|
||||
description: >-
|
||||
Die europäische Alternative zu Chainalysis mit Open-Source-Kern und Fokus
|
||||
@@ -898,14 +923,15 @@ tools:
|
||||
- api
|
||||
- big-data
|
||||
- name: FTK Imager
|
||||
icon: 📦
|
||||
type: software
|
||||
description: >-
|
||||
Der Oldtimer unter den Imaging-Tools, aber immer noch zuverlässig wie ein
|
||||
Schweizer Uhrwerk. Erstellt bit-genaue Kopien von Festplatten mit
|
||||
integrierter Hash-Verifizierung für die Beweiskette. Die kostenlose
|
||||
Version reicht für die meisten Aufgaben, unterstützt alle gängigen
|
||||
Image-Formate. Etwas angestaubt in der Oberfläche, aber bewährt in
|
||||
tausenden Gerichtsverfahren. Freeware, aber nicht open source.
|
||||
Uhrwerk. Erstellt bit-genaue Kopien von Festplatten mit integrierter
|
||||
Hash-Verifizierung für die Beweiskette. Die kostenlose Version reicht für
|
||||
die meisten Aufgaben, unterstützt alle gängigen Image-Formate. Etwas
|
||||
angestaubt in der Oberfläche, aber bewährt in tausenden Gerichtsverfahren.
|
||||
Freeware, aber nicht open source.
|
||||
domains:
|
||||
- law-enforcement
|
||||
- incident-response
|
||||
@@ -928,6 +954,7 @@ tools:
|
||||
- verification
|
||||
- write-blocking
|
||||
- name: Guymager
|
||||
icon: 📦
|
||||
type: software
|
||||
description: >-
|
||||
Das schlanke Linux-Imaging-Tool mit Fokus auf Performance und
|
||||
@@ -957,6 +984,7 @@ tools:
|
||||
- multi-threading
|
||||
- write-blocking
|
||||
- name: Fuji
|
||||
icon: 📦
|
||||
type: software
|
||||
description: >-
|
||||
Der Geheimtipp für macOS-Forensiker - Live-Imaging ohne
|
||||
@@ -986,6 +1014,7 @@ tools:
|
||||
- filesystem
|
||||
- macos-specific
|
||||
- name: ALEAPP
|
||||
icon: 📦
|
||||
type: software
|
||||
description: >-
|
||||
Android-Forensik leicht gemacht - parst dutzende Apps und System-Artefakte
|
||||
@@ -1019,6 +1048,7 @@ tools:
|
||||
- reporting
|
||||
- timeline-analysis
|
||||
- name: iLEAPP
|
||||
icon: 📦
|
||||
type: software
|
||||
description: >-
|
||||
Das iOS-Pendant zu ALEAPP mit Fokus auf Apple's geschlossenem Ökosystem.
|
||||
@@ -1052,6 +1082,7 @@ tools:
|
||||
- reporting
|
||||
- ios-specific
|
||||
- name: VLEAPP
|
||||
icon: 📦
|
||||
type: software
|
||||
description: >-
|
||||
Die Zukunft der Fahrzeug-Forensik für vernetzte Autos und
|
||||
@@ -1086,7 +1117,7 @@ tools:
|
||||
- name: Kali Linux
|
||||
type: software
|
||||
description: >-
|
||||
Die Schweizer Armee-Messer-Distribution mit über 600 vorinstallierten
|
||||
Die wohlbekannte Hacker-Distribution mit über 600 vorinstallierten
|
||||
Security-Tools. Von Forensik über Penetration Testing bis Reverse
|
||||
Engineering ist alles an Bord. Die Live-Boot-Option ermöglicht forensische
|
||||
Untersuchungen ohne Installation. Regelmäßige Updates halten die
|
||||
@@ -1100,17 +1131,8 @@ tools:
|
||||
- mobile-forensics
|
||||
- cloud-forensics
|
||||
- ics-forensics
|
||||
phases: []
|
||||
platforms:
|
||||
- OS
|
||||
domain-agnostic-software:
|
||||
- specific-os
|
||||
skillLevel: intermediate
|
||||
accessType: download
|
||||
url: https://kali.org/
|
||||
projectUrl: null
|
||||
license: GPL-3.0
|
||||
knowledgebase: true
|
||||
tags:
|
||||
- live-boot
|
||||
- tool-collection
|
||||
@@ -1118,7 +1140,16 @@ tools:
|
||||
- forensics-suite
|
||||
- virtualization
|
||||
- arm-support
|
||||
icon: 🖥
|
||||
platforms:
|
||||
- OS
|
||||
accessType: download
|
||||
license: GPL-3.0
|
||||
knowledgebase: true
|
||||
domain-agnostic-software:
|
||||
- specific-os
|
||||
- name: dd
|
||||
icon: 📦
|
||||
type: software
|
||||
description: >-
|
||||
Das Unix-Urgestein für bit-genaues Kopieren von Datenträgern seit 1974.
|
||||
@@ -1149,6 +1180,7 @@ tools:
|
||||
- unix-tool
|
||||
- scripting
|
||||
- name: dcfldd
|
||||
icon: 📦
|
||||
type: software
|
||||
description: >-
|
||||
Die forensische Weiterentwicklung von dd mit eingebauter
|
||||
@@ -1178,6 +1210,7 @@ tools:
|
||||
- progress-monitoring
|
||||
- split-output
|
||||
- name: ewfacquire
|
||||
icon: 📦
|
||||
type: software
|
||||
description: >-
|
||||
Das Kommandozeilen-Tool für Expert Witness Format (E01) Images mit
|
||||
@@ -1208,6 +1241,7 @@ tools:
|
||||
- metadata
|
||||
- verification
|
||||
- name: PhotoRec
|
||||
icon: 📦
|
||||
type: software
|
||||
description: >-
|
||||
Der Datenretter in der Not - findet gelöschte Dateien ohne
|
||||
@@ -1240,6 +1274,7 @@ tools:
|
||||
- signature-based
|
||||
- cross-platform
|
||||
- name: Kismet
|
||||
icon: 📦
|
||||
type: software
|
||||
description: >-
|
||||
Der WLAN-Schnüffler der Extraklasse für Wireless-Forensik und
|
||||
@@ -1270,6 +1305,7 @@ tools:
|
||||
- passive-scanning
|
||||
- api
|
||||
- name: OSFMount
|
||||
icon: 📦
|
||||
type: software
|
||||
description: >-
|
||||
Mountet Disk-Images als virtuelle Laufwerke unter Windows für komfortable
|
||||
@@ -1300,6 +1336,7 @@ tools:
|
||||
- format-support
|
||||
- freeware
|
||||
- name: Thumbcache Viewer
|
||||
icon: 📦
|
||||
type: software
|
||||
description: >-
|
||||
Spezialist für Windows Thumbnail-Caches mit Zugriff auf gelöschte
|
||||
@@ -1330,6 +1367,7 @@ tools:
|
||||
- thumbnail-extraction
|
||||
- deleted-data
|
||||
- name: RegRipper
|
||||
icon: 📦
|
||||
type: software
|
||||
description: >-
|
||||
Der Windows-Registry-Experte mit hunderten Plugins für automatisierte
|
||||
@@ -1368,24 +1406,15 @@ tools:
|
||||
Regelbasierte Suche nach Strings, Byte-Sequenzen und regulären Ausdrücken.
|
||||
De-facto Standard für Malware-Signaturen mit riesiger
|
||||
Community-Rule-Sammlung. Integration in viele Forensik-Tools macht es zum
|
||||
universellen Schweizer Messer.
|
||||
Marktstandard.
|
||||
domains:
|
||||
- incident-response
|
||||
- malware-analysis
|
||||
phases:
|
||||
- examination
|
||||
- analysis
|
||||
platforms:
|
||||
- Windows
|
||||
- Linux
|
||||
- macOS
|
||||
domain-agnostic-software: null
|
||||
skillLevel: intermediate
|
||||
accessType: download
|
||||
url: https://virustotal.github.io/yara/
|
||||
projectUrl: ''
|
||||
license: BSD-3-Clause
|
||||
knowledgebase: false
|
||||
tags:
|
||||
- commandline
|
||||
- pattern-matching
|
||||
@@ -1393,7 +1422,16 @@ tools:
|
||||
- rule-engine
|
||||
- library
|
||||
- signature-based
|
||||
icon: 🛠
|
||||
platforms:
|
||||
- Windows
|
||||
- Linux
|
||||
- macOS
|
||||
accessType: download
|
||||
license: BSD-3-Clause
|
||||
knowledgebase: false
|
||||
- name: Strings
|
||||
icon: 📦
|
||||
type: software
|
||||
description: >-
|
||||
Das simple Tool mit großer Wirkung - extrahiert lesbare Texte aus
|
||||
@@ -1434,21 +1472,12 @@ tools:
|
||||
Anreicherung großer Datensätze.
|
||||
domains:
|
||||
- incident-response
|
||||
- network-forensics
|
||||
- fraud-investigation
|
||||
- network-forensics
|
||||
phases:
|
||||
- analysis
|
||||
platforms:
|
||||
- Windows
|
||||
- Linux
|
||||
- macOS
|
||||
domain-agnostic-software: null
|
||||
skillLevel: beginner
|
||||
accessType: download
|
||||
url: https://www.maxmind.com/
|
||||
projectUrl: ''
|
||||
license: GeoLite2 EULA / Commercial
|
||||
knowledgebase: false
|
||||
tags:
|
||||
- api
|
||||
- geolocation
|
||||
@@ -1456,6 +1485,14 @@ tools:
|
||||
- database
|
||||
- enrichment
|
||||
- library
|
||||
icon: 🗄
|
||||
platforms:
|
||||
- Windows
|
||||
- Linux
|
||||
- macOS
|
||||
accessType: download
|
||||
license: GeoLite2 EULA / Commercial
|
||||
knowledgebase: false
|
||||
- name: SIFT Workstation
|
||||
type: software
|
||||
description: >-
|
||||
@@ -1470,17 +1507,8 @@ tools:
|
||||
- malware-analysis
|
||||
- network-forensics
|
||||
- mobile-forensics
|
||||
phases: []
|
||||
platforms:
|
||||
- OS
|
||||
domain-agnostic-software:
|
||||
- specific-os
|
||||
skillLevel: intermediate
|
||||
accessType: download
|
||||
url: https://www.sans.org/tools/sift-workstation/
|
||||
projectUrl: ''
|
||||
license: Free / Mixed
|
||||
knowledgebase: false
|
||||
tags:
|
||||
- virtual-machine
|
||||
- tool-collection
|
||||
@@ -1488,6 +1516,14 @@ tools:
|
||||
- training-focused
|
||||
- documentation
|
||||
- ubuntu-based
|
||||
icon: 🖥
|
||||
platforms:
|
||||
- OS
|
||||
accessType: download
|
||||
license: Free / Mixed
|
||||
knowledgebase: false
|
||||
domain-agnostic-software:
|
||||
- specific-os
|
||||
- name: Tsurugi Linux
|
||||
type: software
|
||||
description: >-
|
||||
@@ -1503,21 +1539,22 @@ tools:
|
||||
- law-enforcement
|
||||
- malware-analysis
|
||||
- mobile-forensics
|
||||
platforms:
|
||||
- OS
|
||||
domain-agnostic-software:
|
||||
- specific-os
|
||||
skillLevel: intermediate
|
||||
accessType: download
|
||||
url: https://tsurugi-linux.org/
|
||||
license: GPL / Mixed
|
||||
knowledgebase: false
|
||||
tags:
|
||||
- live-boot
|
||||
- tool-collection
|
||||
- forensics-suite
|
||||
- mobile-focus
|
||||
- lightweight
|
||||
icon: 🖥
|
||||
platforms:
|
||||
- OS
|
||||
accessType: download
|
||||
license: GPL / Mixed
|
||||
knowledgebase: false
|
||||
domain-agnostic-software:
|
||||
- specific-os
|
||||
- name: Parrot Security OS
|
||||
type: software
|
||||
description: >-
|
||||
@@ -1531,17 +1568,8 @@ tools:
|
||||
- law-enforcement
|
||||
- malware-analysis
|
||||
- network-forensics
|
||||
phases: []
|
||||
platforms:
|
||||
- OS
|
||||
domain-agnostic-software:
|
||||
- specific-os
|
||||
skillLevel: intermediate
|
||||
accessType: download
|
||||
url: https://parrotsec.org/
|
||||
projectUrl: ''
|
||||
license: GPL-3.0
|
||||
knowledgebase: false
|
||||
tags:
|
||||
- live-boot
|
||||
- privacy-focused
|
||||
@@ -1549,7 +1577,16 @@ tools:
|
||||
- rolling-release
|
||||
- lightweight
|
||||
- anonymization
|
||||
icon: 🖥
|
||||
platforms:
|
||||
- OS
|
||||
accessType: download
|
||||
license: GPL-3.0
|
||||
knowledgebase: false
|
||||
domain-agnostic-software:
|
||||
- specific-os
|
||||
- name: Eric Zimmerman Tools
|
||||
icon: 📦
|
||||
type: software
|
||||
description: >-
|
||||
Die Tool-Sammlung des Windows-Forensik-Gurus für Artefakt-Analyse. Von
|
||||
@@ -1579,6 +1616,7 @@ tools:
|
||||
- tool-collection
|
||||
- artifact-extraction
|
||||
- name: Impacket
|
||||
icon: 📦
|
||||
type: software
|
||||
description: >-
|
||||
Python-Bibliothek für Netzwerk-Protokoll-Manipulation und
|
||||
@@ -1612,6 +1650,7 @@ tools:
|
||||
- scripting
|
||||
- api
|
||||
- name: RSA NetWitness
|
||||
icon: 📦
|
||||
type: software
|
||||
description: >-
|
||||
Enterprise-Grade SIEM und Forensik-Plattform für große Netzwerke.
|
||||
@@ -1644,6 +1683,7 @@ tools:
|
||||
- machine-learning
|
||||
- enterprise
|
||||
- name: X-Ways Forensics
|
||||
icon: 📦
|
||||
type: software
|
||||
description: >-
|
||||
Der deutsche Präzisionsskalpell unter den Forensik-Tools mit
|
||||
@@ -1674,6 +1714,7 @@ tools:
|
||||
- german-made
|
||||
- hex-editor
|
||||
- name: EnCase
|
||||
icon: 📦
|
||||
type: software
|
||||
description: >-
|
||||
Der Veteran der kommerziellen Forensik-Tools mit 25 Jahren
|
||||
@@ -1705,6 +1746,7 @@ tools:
|
||||
- certification
|
||||
- scripting
|
||||
- name: FRED
|
||||
icon: 🔧
|
||||
type: software
|
||||
description: >-
|
||||
Forensic Recovery of Evidence Device - spezialisierte Hardware für
|
||||
@@ -1745,20 +1787,22 @@ tools:
|
||||
- data-collection
|
||||
- examination
|
||||
- analysis
|
||||
platforms:
|
||||
- Windows
|
||||
- Linux
|
||||
- macOS
|
||||
skillLevel: advanced
|
||||
accessType: download
|
||||
url: https://github.com/microsoft/ics-forensics-tools
|
||||
license: MIT
|
||||
knowledgebase: false
|
||||
tags:
|
||||
- python
|
||||
- binary
|
||||
- scripting
|
||||
- name: "Live Memory Acquisition Procedure"
|
||||
icon: 🛠
|
||||
platforms:
|
||||
- Windows
|
||||
- Linux
|
||||
- macOS
|
||||
accessType: download
|
||||
license: MIT
|
||||
knowledgebase: false
|
||||
- name: Live Memory Acquisition Procedure
|
||||
icon: 📋
|
||||
type: method
|
||||
description: >-
|
||||
Standardisiertes Verfahren zur forensisch korrekten Akquisition des
|
||||
@@ -1777,8 +1821,9 @@ tools:
|
||||
domain-agnostic-software: null
|
||||
skillLevel: advanced
|
||||
accessType: null
|
||||
url: https://www.nist.gov/publications/guide-integrating-forensic-techniques-incident-response
|
||||
projectUrl:
|
||||
url: >-
|
||||
https://www.nist.gov/publications/guide-integrating-forensic-techniques-incident-response
|
||||
projectUrl: null
|
||||
license: null
|
||||
knowledgebase: false
|
||||
tags:
|
||||
@@ -1788,7 +1833,8 @@ tools:
|
||||
- ram-dump
|
||||
- evidence-preservation
|
||||
- procedure
|
||||
- name: "Rapid Incident Response Triage on macOS"
|
||||
- name: Rapid Incident Response Triage on macOS
|
||||
icon: 📋
|
||||
type: method
|
||||
description: >-
|
||||
Spezialisierte Methodik für die schnelle Incident Response auf
|
||||
@@ -1796,8 +1842,8 @@ tools:
|
||||
Artefakte in unter einer Stunde. Adressiert die Lücke zwischen
|
||||
Windows-zentrierten IR-Prozessen und macOS-spezifischen
|
||||
Sicherheitsarchitekturen. Nutzt Tools wie Aftermath für effiziente
|
||||
Datensammlung ohne zeitaufwändige Full-Disk-Images. Besonders wertvoll
|
||||
für Unternehmensumgebungen mit gemischten Betriebssystem-Landschaften.
|
||||
Datensammlung ohne zeitaufwändige Full-Disk-Images. Besonders wertvoll für
|
||||
Unternehmensumgebungen mit gemischten Betriebssystem-Landschaften.
|
||||
domains:
|
||||
- incident-response
|
||||
- law-enforcement
|
||||
@@ -1809,10 +1855,11 @@ tools:
|
||||
domain-agnostic-software: null
|
||||
skillLevel: intermediate
|
||||
accessType: null
|
||||
url: https://www.sans.org/white-papers/rapid-incident-response-on-macos-actionable-insights-under-hour/
|
||||
projectUrl:
|
||||
url: >-
|
||||
https://www.sans.org/white-papers/rapid-incident-response-on-macos-actionable-insights-under-hour/
|
||||
projectUrl: null
|
||||
license: null
|
||||
knowledgebase:
|
||||
knowledgebase: null
|
||||
tags:
|
||||
- macos
|
||||
- rapid-response
|
||||
@@ -1822,14 +1869,15 @@ tools:
|
||||
- enterprise
|
||||
- methodology
|
||||
- apple
|
||||
- name: "Aftermath"
|
||||
- name: Aftermath
|
||||
icon: 📦
|
||||
type: software
|
||||
description: >-
|
||||
Jamf's Open-Source-Tool für die schnelle Sammlung forensischer Artefakte
|
||||
auf macOS-Systemen. Sammelt kritische Daten wie Prozessinformationen,
|
||||
Netzwerkverbindungen, Dateisystem-Metadaten und Systemkonfigurationen
|
||||
ohne Full-Disk-Imaging. Speziell entwickelt für die Rapid-Response-Triage
|
||||
in Enterprise-Umgebungen mit macOS-Geräten. Normalisiert Zeitstempel und
|
||||
Netzwerkverbindungen, Dateisystem-Metadaten und Systemkonfigurationen ohne
|
||||
Full-Disk-Imaging. Speziell entwickelt für die Rapid-Response-Triage in
|
||||
Enterprise-Umgebungen mit macOS-Geräten. Normalisiert Zeitstempel und
|
||||
erstellt durchsuchbare Ausgabeformate für effiziente Analyse.
|
||||
domains:
|
||||
- incident-response
|
||||
|
||||
@@ -353,13 +353,12 @@ function createToolCard(tool) {
|
||||
cardDiv.style.cursor = 'pointer';
|
||||
cardDiv.onclick = () => (window as any).showToolDetails(tool.name);
|
||||
|
||||
|
||||
cardDiv.innerHTML = `
|
||||
<div class="tool-card-header">
|
||||
<h3>${tool.name}</h3>
|
||||
<h3>${tool.icon ? `<span style="margin-right: 0.5rem; font-size: 1.125rem;">${tool.icon}</span>` : ''}${tool.name}</h3>
|
||||
<div class="tool-card-badges">
|
||||
${isMethod ? '<span class="badge" style="background-color: var(--color-method); color: white;">Methode</span>' : ''}
|
||||
${!isMethod && hasValidProjectUrl ? '<span class="badge badge-primary">CC24-Server</span>' : ''}
|
||||
${!isMethod && tool.license !== 'Proprietary' ? '<span class="badge badge-success">OSS</span>' : ''}
|
||||
${!isMethod && hasValidProjectUrl ? '<span class="badge badge-primary">Self-Hosted</span>' : ''}
|
||||
${hasKnowledgebase ? '<span class="badge badge-error">📖</span>' : ''}
|
||||
</div>
|
||||
</div>
|
||||
|
||||
@@ -5,7 +5,7 @@ import { z } from 'zod';
|
||||
|
||||
const ToolSchema = z.object({
|
||||
name: z.string(),
|
||||
icon: z.string().optional(),
|
||||
icon: z.string().optional().nullable(),
|
||||
type: z.string(),
|
||||
description: z.string(),
|
||||
domains: z.array(z.string()).optional().nullable().default([]),
|
||||
|
||||
Reference in New Issue
Block a user