Skip to content
/ fox Public

The Forensic Examiners Swiss Army Knife. Providing many useful features to leverage your forensic examination process.

License

Notifications You must be signed in to change notification settings

cuhsat/fox

Repository files navigation

fox

The Forensic Examiners Swiss Army Knife. Providing many useful features to leverage your forensic examination process. Standalone binaries available for Windows, Linux and macOS.

Go Report Build Commits Release

term

Get it on Linux

go install github.com/cuhsat/fox/v4@latest

Get it on macOS

brew install cuhsat/fox/fox

Features

  • Restricted read-only access
  • Bidirectional character detection
  • Fast Shannon entropy calculation
  • String carving and automatic classification
  • With over 290 classes in Hashcat notation
  • Dump Active Directory and other EDB files
  • Dump Windows shortcut and prefetch files
  • Dump Linux ELF and Windows PE/COFF executables
  • Check IPs, URLs, Domains and files via the VirusTotal API
  • Integral grep, head, tail, hexdump, wc like abilities
  • Integral syntax highlighting for many different formats
  • Integral Chain-of-Custody receipt generation
  • Many popular archive and compression formats
  • Many popular cryptographic, fuzzy, image and fast hashes
  • Complete with man pages for every mode
  • Special Hunt mode

Examples

Find occurrences in event logs:

$ fox -eWinlogon ./**/*.evtx

Show MBR in canonical hex:

$ fox hex -hc512 disk.bin

List high entropy files:

$ fox list -n0.9 ./**/*

Show strings in binary:

$ fox text -w ioc.exe

Test a suspicious file:

$ fox test ioc.exe

Hash archive contents:

$ fox hash -uTLSH files.7z

Hunt down suspicious events:

$ fox hunt -sv ./**/*.E01

Supports

File Formats

evtx, journal, json, jsonl, lnk, pf, ELF, ESE/EDB, PE/COFF

Image Formats

EWF-E01, EWF-S01, raw

Archive Formats

7zip, ar, CAB, CPIO, ISO, RAR, RPM, tar, xar, ZIP

Compression Formats

Brotli, bzip2, gzip, Kanzi, lz4, lzip, lzma, LZFSE, LZO, LZVN, LZW, LZX, MinLZ, S2, Snappy, xz, zlib, zstd

Cryptographic Hashes

BLAKE2S-256, BLAKE2B-256, BLAKE2B-384, BLAKE2B-512, BLAKE3-256, BLAKE3-512, HAS-160, MD2, MD4, MD5, MD6, RIPEMD-160, SHAKE128, SHAKE256, SHA1, SHA224, SHA256, SHA512, SHA3, SHA3-224, SHA3-256, SHA3-384, SHA3-512, SM3, Whirlpool

Performance Hashes

FNV-1, FNV-1a, Murmur3, SipHash, XXH32, XXH64, XXH3

Similarity Hashes

ImpHash, SSDeep, TLSH

Windows Specific

LM, NT, PE Checksum

Image Specific

aHash, dHash, pHash

Checksums

Adler32, Fletcher-4, CRC32-C, CRC32-IEEE, CRC64-ECMA, CRC64-ISO


Disclaimer: This code was developed without the use of AI tooling and therefor does not contain any AI generated code, test or documentation. Furthermore, this code does not contain, employ or utilize AI tools in any other form. All data processed will not be shared with third parties except otherwise explicitly stated and permitted by the user.


🦊 is released under the GPL-3.0