๐Ÿ”ฌ NullSec Forensics

February 27, 2026 ยท View on GitHub

๐Ÿ”ฌ NullSec Forensics

Advanced Digital Forensics & Incident Response Toolkit

X/Twitter GitHub License

Rust Zig Python D

    โ–ˆโ–ˆโ–ˆโ–„    โ–ˆ  โ–ˆ    โ–ˆโ–ˆ  โ–ˆโ–ˆโ–“     โ–ˆโ–ˆโ–“      โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆ โ–“โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆ  โ–„โ–ˆโ–ˆโ–ˆโ–ˆโ–„  
    โ–ˆโ–ˆ โ–€โ–ˆ   โ–ˆ  โ–ˆโ–ˆ  โ–“โ–ˆโ–ˆโ–’โ–“โ–ˆโ–ˆโ–’    โ–“โ–ˆโ–ˆโ–’    โ–’โ–ˆโ–ˆ    โ–’ โ–“โ–ˆ   โ–€ โ–’โ–ˆโ–ˆโ–€ โ–€โ–ˆ  
   โ–“โ–ˆโ–ˆ  โ–€โ–ˆ โ–ˆโ–ˆโ–’โ–“โ–ˆโ–ˆ  โ–’โ–ˆโ–ˆโ–‘โ–’โ–ˆโ–ˆโ–‘    โ–’โ–ˆโ–ˆโ–‘    โ–‘ โ–“โ–ˆโ–ˆโ–„   โ–’โ–ˆโ–ˆโ–ˆ   โ–’โ–“โ–ˆ    โ–„ 
   โ–“โ–ˆโ–ˆโ–’  โ–โ–Œโ–ˆโ–ˆโ–’โ–“โ–“โ–ˆ  โ–‘โ–ˆโ–ˆโ–‘โ–’โ–ˆโ–ˆโ–‘    โ–’โ–ˆโ–ˆโ–‘      โ–’   โ–ˆโ–ˆโ–’โ–’โ–“โ–ˆ  โ–„ โ–’โ–“โ–“โ–„ โ–„โ–ˆโ–ˆโ–’
   โ–’โ–ˆโ–ˆโ–‘   โ–“โ–ˆโ–ˆโ–‘โ–’โ–’โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–“ โ–‘โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–’โ–‘โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–’โ–’โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–’โ–’โ–‘โ–’โ–ˆโ–ˆโ–ˆโ–ˆโ–’โ–’ โ–“โ–ˆโ–ˆโ–ˆโ–€ โ–‘
   โ–‘ โ–’โ–‘   โ–’ โ–’ โ–‘โ–’โ–“โ–’ โ–’ โ–’ โ–‘ โ–’โ–‘โ–“  โ–‘โ–‘ โ–’โ–‘โ–“  โ–‘โ–’ โ–’โ–“โ–’ โ–’ โ–‘โ–‘โ–‘ โ–’โ–‘ โ–‘โ–‘ โ–‘โ–’ โ–’  โ–‘
     โ–‘    โ–‘    โ–‘   โ–‘   โ–‘         โ–‘            โ–‘   โ–‘   โ–‘        
   โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„
   โ–ˆโ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘ F O R E N S I C S โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–ˆ
   โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€
                       bad-antics

๐Ÿ”“ Join x.com/AnonAntics for premium features!


๐ŸŽฏ Features

ToolLanguageDescriptionFreePremium
memhunterRustMemory analysis & extractionโœ…๐Ÿ”ฅ
filecarveZigHigh-speed file recoveryโœ…๐Ÿ”ฅ
timelinerRustForensic timeline generatorโœ…๐Ÿ”ฅ
hasherRustRecursive hash verificationโœ…๐Ÿ”ฅ
peanalyzePythonPE/ELF malware triageโœ…๐Ÿ”ฅ
regparseRustWindows registry parserโŒ๐Ÿ”ฅ

๐Ÿ“ Structure

nullsec-forensics/
โ”œโ”€โ”€ rust/
โ”‚   โ”œโ”€โ”€ memhunter/       # Memory forensics
โ”‚   โ”œโ”€โ”€ timeliner/       # Timeline generation
โ”‚   โ”œโ”€โ”€ hasher/          # File hashing
โ”‚   โ””โ”€โ”€ regparse/        # Registry parsing
โ”œโ”€โ”€ zig/
โ”‚   โ”œโ”€โ”€ filecarve/       # File carving
โ”‚   โ””โ”€โ”€ diskimage/       # Disk imaging
โ”œโ”€โ”€ python/
โ”‚   โ”œโ”€โ”€ peanalyze.py     # PE analysis
โ”‚   โ”œโ”€โ”€ elfparse.py      # ELF analysis
โ”‚   โ”œโ”€โ”€ yara_scan.py     # YARA scanning
โ”‚   โ””โ”€โ”€ strings_plus.py  # Enhanced strings
โ””โ”€โ”€ scripts/
    โ”œโ”€โ”€ acquire.sh       # Evidence acquisition
    โ””โ”€โ”€ report.py        # Report generation

๐Ÿ”ง Tool Details

memhunter (Rust) - Memory Forensics

Features:

  • Process memory dumping
  • String extraction with encoding detection
  • Pattern/regex searching
  • Credential extraction (LSASS, browsers)
  • Rootkit detection signatures
# Dump process memory
sudo ./memhunter -p 1234 -o dump.bin

# Search for patterns
./memhunter -i dump.bin -s "password" --context 50

# Extract strings
./memhunter -i dump.bin --strings -e utf16 -o strings.txt

# Hunt for credentials
sudo ./memhunter --creds -o credentials.json

filecarve (Zig) - File Recovery

Supported formats:

  • Images: JPEG, PNG, GIF, BMP, TIFF
  • Documents: PDF, DOCX, XLSX, PPTX
  • Archives: ZIP, RAR, 7Z, TAR
  • Media: MP3, MP4, AVI, MKV
  • Databases: SQLite, MySQL dumps
# Carve from disk image
./filecarve -i disk.dd -o recovered/ --all

# Specific file types
./filecarve -i disk.dd -o recovered/ -t jpeg,pdf,docx

# Raw device (requires root)
sudo ./filecarve -i /dev/sda -o recovered/ -t all

๐Ÿš€ Quick Start

# Memory acquisition
sudo ./memhunter --acquire -o memory.raw

# Analyze memory dump
./memhunter -i memory.raw --processes
./memhunter -i memory.raw --network
./memhunter -i memory.raw --strings -o strings.txt

# File carving
./filecarve -i evidence.dd -o recovered/

# Generate timeline
./timeliner -i evidence.dd -o timeline.csv

# Hash verification
./hasher -d /evidence -a sha256 -o hashes.txt
./hasher --verify hashes.txt

For authorized forensic investigations only. Follow proper chain of custody procedures.


NullSec Framework | GitHub | X/Twitter