Home/Free Incident Response Tools

Free Incident Response Tools

Respond to security incidents effectively with free and open source tools. Browse digital forensics, incident response platforms, memory analysis, and log analysis tools for DFIR teams.

164 tools·33 sub-categories·Updated April 2026

Showing 24 of 164 tools

mvt icon

mvt

mvt-project/mvt

Tool

MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.

12.0K
3 months ago
post-mortems icon

post-mortems

danluu/post-mortems

Documentation

A collection of postmortems. Sorry for the delay in merging PRs!

11.6K
10 months ago
Detect-It-Easy icon

Detect-It-Easy

horsicq/Detect-It-Easy

Tool

Program for determining types of files for Windows, Linux and MacOS.

10.0K
2 months ago
howtheysre icon

howtheysre

upgundecha/howtheysre

Documentation

A curated collection of publicly available resources on how technology and tech-savvy organizations around the world practice Site Reliability Engineering (SRE)

9.4K
8 months ago
awesome-incident-response icon

awesome-incident-response

meirwah/awesome-incident-response

Documentation

A curated list of tools for incident response

8.3K
8 months ago
chainsaw icon

chainsaw

WithSecureLabs/chainsaw

Tool

Rapidly Search and Hunt through Windows Forensic Artefacts

3.4K
4 months ago
tracecat icon

tracecat

TracecatHQ/tracecat

Tool

All-in-one AI automation platform (workflows, agents, cases, tables) for security, IT, and production engineering teams.

3.3K
6 months ago
timesketch icon

timesketch

google/timesketch

Tool

Collaborative forensic timeline analysis

2.8K
8 months ago
CAPEv2 icon

CAPEv2

kevoreilly/CAPEv2

Tool

Malware Configuration And Payload Extraction

2.8K
5 months ago
GScan icon

GScan

grayddq/GScan

Tool

本程序旨在为安全应急响应人员对Linux主机排查时提供便利,实现主机侧Checklist的自动全面化检测,根据检测结果自动数据聚合,进行黑客攻击路径溯源。

2.8K
5 months ago
Digital-Forensics-Guide icon

Digital-Forensics-Guide

mikeroyal/Digital-Forensics-Guide

Educational Resource

Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database Forensics.

2.4K
about 1 month ago
digital-forensics-lab icon

digital-forensics-lab

frankwxu/digital-forensics-lab

Educational Resource

Free hands-on digital forensics labs for students and faculty

2.2K
6 months ago
MemLabs icon

MemLabs

stuxnet999/MemLabs

Educational Resource

Educational, CTF-styled labs for individuals interested in Memory Forensics

1.7K
8 months ago
PcapXray icon

PcapXray

Srinivas11789/PcapXray

Tool

:snowflake: PcapXray - A Network Forensics Tool - To visualize a Packet Capture offline as a Network Diagram including device identification, highlight important communication and file extraction

1.7K
8 months ago
RecoverPy icon

RecoverPy

PabloLec/RecoverPy

Tool

Interactively find and recover deleted or :point_right: overwritten :point_left: files from your terminal

1.7K
3 months ago
Qu1cksc0pe icon

Qu1cksc0pe

CYB3RMX/Qu1cksc0pe

Tool

All-in-One malware analysis tool.

1.7K
5 months ago
Incident-Playbook icon

Incident-Playbook

austinsonger/Incident-Playbook

Documentation

GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]

1.5K
8 months ago
beagle icon

beagle

yampelo/beagle

Tool

Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.

1.3K
4 months ago
uac icon

uac

tclahr/uac

Tool

UAC is a powerful and extensible incident response tool designed for forensic investigators, security analysts, and IT professionals. It automates the collection of artifacts from a wide range of Unix-like systems, including AIX, ESXi, FreeBSD, Linux, macOS, NetBSD, NetScaler, OpenBSD and Solaris.

1.1K
8 months ago
DumpsterFire icon

DumpsterFire

TryCatchHCF/DumpsterFire

Tool

"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.

1.0K
8 months ago
strelka icon

strelka

target/strelka

Tool

Real-time, container-based file scanning at enterprise scale

935
8 months ago
awesome-anti-forensic icon

awesome-anti-forensic

shadawck/awesome-anti-forensic

Tool

Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attributes. This all includes tools to work with anything in general that makes changes to a system for the purposes of hiding information.

896
8 months ago
DataSurgeon icon

DataSurgeon

Drew-Alleman/DataSurgeon

Tool

Quickly Extracts IP's, Email Addresses, Hashes, Files, Credit Cards, Social Security Numbers and a lot More From Text

853
8 months ago
Kuiper icon

Kuiper

DFIRKuiper/Kuiper

Tool

Digital Forensics Investigation Platform

836
8 months ago

Can't find the right tool?

Describe what you need in plain English and our AI will find the best match from 10,000+ security tools.

Frequently Asked Questions

What is the incident response lifecycle?

The NIST incident response lifecycle has four phases: Preparation (building capabilities before incidents), Detection & Analysis (identifying and understanding incidents), Containment, Eradication & Recovery (stopping and removing the threat), and Post-Incident Activity (lessons learned). Tools support each phase.

What is the best free incident response platform?

TheHive is the leading open source security incident response platform, providing case management, task tracking, and integration with threat intelligence tools like MISP and Cortex. It's designed for SOC teams and supports collaborative investigation workflows.

What tools are used in digital forensics?

Key open source DFIR tools include Autopsy (disk forensics), Volatility (memory forensics), Plaso (timeline analysis), KAPE (artifact collection), and Velociraptor (live forensics and threat hunting). The SANS SIFT Workstation bundles many of these tools in a pre-configured Linux environment.

How do I perform memory forensics?

Volatility Framework is the standard open source tool for memory forensics. It analyzes RAM dumps to extract running processes, network connections, loaded drivers, and injected code. Rekall is an alternative framework. Memory forensics is critical for detecting fileless malware and advanced persistent threats.