The Forensic Examiners Swiss Army Knife. Providing many useful features to leverage your forensic examination process. Standalone binaries available for Windows, Linux and macOS.
Get it on Linux
go install github.com/cuhsat/fox/v4@latestGet it on macOS
brew install cuhsat/fox/fox- Restricted read-only access
- Bidirectional character detection
- Fast Shannon entropy calculation
- String carving and automatic classification
- With over 290 classes in Hashcat notation
- Dump Active Directory and other EDB files
- Dump Windows shortcut and prefetch files
- Dump Linux ELF and Windows PE/COFF executables
- Check IPs, URLs, Domains and files via the VirusTotal API
- Integral
grep,head,tail,hexdump,wclike abilities - Integral syntax highlighting for many different formats
- Integral Chain-of-Custody receipt generation
- Many popular archive and compression formats
- Many popular cryptographic, fuzzy, image and fast hashes
- Complete with man pages for every mode
- Special Hunt mode
- Built-in support for EnCase EWF and raw
ddimages - Built-in log carving of Linux Journals and Windows Event Logs
- Built-in super timeline in Common Event Format
- Built-in translation of over 51600 event ids
- Built-in warning of critical system events
- Filter events with Sigma Rules syntax
- Filter anomalies using Levenshtein distance
- Stream in Splunk HEC and Elastic ECS format
- Save as
JSON,JSON LinesorSQLite3
- Built-in support for EnCase EWF and raw
Find occurrences in event logs:
$ fox -eWinlogon ./**/*.evtxShow MBR in canonical hex:
$ fox hex -hc512 disk.binList high entropy files:
$ fox list -n0.9 ./**/*Show strings in binary:
$ fox text -w ioc.exeTest a suspicious file:
$ fox test ioc.exeHash archive contents:
$ fox hash -uTLSH files.7zHunt down suspicious events:
$ fox hunt -sv ./**/*.E01File Formats
evtx, journal, json, jsonl, lnk, pf, ELF, ESE/EDB, PE/COFF
Image Formats
EWF-E01, EWF-S01, raw
Archive Formats
7zip, ar, CAB, CPIO, ISO, RAR, RPM, tar, xar, ZIP
Compression Formats
Brotli, bzip2, gzip, Kanzi, lz4, lzip, lzma, LZFSE, LZO, LZVN, LZW, LZX, MinLZ, S2, Snappy, xz, zlib, zstd
Cryptographic Hashes
BLAKE2S-256, BLAKE2B-256, BLAKE2B-384, BLAKE2B-512, BLAKE3-256, BLAKE3-512, HAS-160, MD2, MD4, MD5, MD6, RIPEMD-160, SHAKE128, SHAKE256, SHA1, SHA224, SHA256, SHA512, SHA3, SHA3-224, SHA3-256, SHA3-384, SHA3-512, SM3, Whirlpool
Performance Hashes
FNV-1, FNV-1a, Murmur3, SipHash, XXH32, XXH64, XXH3
Similarity Hashes
ImpHash, SSDeep, TLSH
Windows Specific
LM, NT, PE Checksum
Image Specific
aHash, dHash, pHash
Checksums
Adler32, Fletcher-4, CRC32-C, CRC32-IEEE, CRC64-ECMA, CRC64-ISO
Disclaimer: This code was developed without the use of AI tooling and therefor does not contain any AI generated code, test or documentation. Furthermore, this code does not contain, employ or utilize AI tools in any other form. All data processed will not be shared with third parties except otherwise explicitly stated and permitted by the user.
🦊 is released under the GPL-3.0

