ForensicsMainHand
Modern digital forensics toolkit: image, file, and cryptography analysis (EXIF, stego, ciphers, carving, OCR). By Dhype7 (NYX team).
Install / Use
/learn @Dhype7/ForensicsMainHandREADME
ForensicsMainHand 🔍
Credit: Project by Dhype7 (NYX team)
Note: This toolkit gives you all you need for forensics & penetration testing methodology.
A comprehensive digital forensics toolkit with a modern GUI, designed for image, file, and cryptography analysis. Built for CTFs, security research, and forensic investigations.
🚀 Quick Start
1. Download
git clone https://github.com/Dhype7/ForensicsMainHand.git
cd ForensicsMainHand
2. Install
sudo chmod +x install.sh run.sh
sudo ./install.sh
This automatically installs all dependencies and sets up the environment.
3. Run
./run.sh
Or use the desktop shortcut created during installation.
📥 Detailed Installation Guide
Prerequisites
- Operating System: Kali Linux (recommended) or any Debian/Ubuntu-based Linux distribution
- Python: 3.8 or higher (automatically installed by the script)
- Root Access: Required for installing system tools
Automatic Installation (Recommended)
The install.sh script handles everything automatically:
# 1. Make the script executable
chmod +x install.sh
# 2. Run the installation (requires sudo)
sudo ./install.sh
What the installer does:
- Updates package repositories
- Installs system tools:
tesseract-ocr,steghide,exiftool,binwalk,hashcat,zsteg,hash-identifier - Creates Python virtual environment
- Installs all Python dependencies from
requirements.txt - Sets up desktop shortcut
- Verifies all installations
Manual Installation (Advanced Users)
If you prefer manual installation, you'll need to install:
System Tools:
sudo apt update
sudo apt install -y python3 python3-pip python3-tk python3-pil.imagetk tesseract-ocr steghide exiftool binwalk hashcat hash-identifier ruby-full
sudo gem install zsteg
Python Dependencies:
python3 -m venv venv
source venv/bin/activate
pip install -r requirements.txt
🎯 How to Run
Method 1: Using the Launcher Script (Recommended)
./run.sh
This script automatically:
- Activates the virtual environment
- Checks for required files
- Launches the application
Method 2: Desktop Shortcut
After installation, a desktop shortcut is created. Simply double-click it to run.
Method 3: Manual Launch
source venv/bin/activate
python main.py
Method 4: Direct Python Execution
python3 main.py
Note: This requires all dependencies to be installed system-wide.
Method 5: Launch the Web Analyzer (Web UI)
You can launch the Web Analyzer in two ways:
From the command line:
python main.py --web
This will start a local web server. Open your browser and go to http://127.0.0.1:5000.
From the GUI:
- Open the main application as usual (
./run.shor desktop shortcut) - Click the "Launch Web Analyzer" button on the main menu
- A message will appear with the URL to open in your browser
🌟 Features
🖼️ Photo Analyzer
- EXIF Data Extraction: Device info, timestamps, GPS coordinates
- Location Analysis: Reverse geocoding with address lookup
- Metadata Analysis: Comprehensive metadata with ExifTool
- String Extraction: Find readable strings in files
- Binwalk Integration: Hidden file and binary analysis
- Steghide Integration: Hide/extract data in images
- OCR: Extract text from images using Tesseract
- QR/Barcode Analysis: Decode embedded QR codes and barcodes
- File Carving: Recover embedded files from binary data
- Hex Viewer: Visual byte-level file inspection
🔐 Cryptography Module
- Classical Ciphers: Affine, Atbash, Bacon, Caesar, Playfair, Rail Fence, Rot13, Scytale, Substitution, Vigenère, XOR, Binary, and more
- Advanced Crypto: RSA, AES, Blowfish, DES, RC4, OTP, Base64/32/16, SHA-256, MD5, HMAC
- Magic Hasher: Identify hash types and crack hashes with hashcat integration
- Modern UI: Split view for classical/advanced crypto, user-friendly interface
- File Import/Export: Work with text files or binary files
- Dynamic Parameters: Context-sensitive options
- Real-time Feedback: Status bar with progress and error handling
📁 File Analyzer
- Type Detection: Detect file type using magic bytes, mimetypes, and permissions, with user-friendly explanations
- Extract Archive: Robust extraction for all major archive types, with password-protection detection
- Compress File: Compress files/folders to zip, 7z, tar, gz, bz2, xz, lzma, rar, zst, ar, lz4 (with password support)
- String Extraction: CTF-grade tool for ASCII/Unicode strings, filtering, unique toggle, min length, copy/save
- File Carving: Carve embedded files using magic numbers, with save/filter/hex preview
- Entropy Analysis: Windowed entropy calculation, bar graph, summary stats, and plain-language explanation
- Stego Analysis: Runs multiple steganography and metadata tools (exiftool, binwalk, zsteg, steghide, outguess, strings, appended data check), with summary and save options
- File Breaker: Password cracker for archives using John the Ripper and *2john tools, with wordlist selection and toolbar
- Recursive Extraction: Recursively extract nested archives, with summary table and output folder access
🎨 Modern GUI
- Dark/Light Theme: Professional themes with easy switching
- Intuitive Layout: User-friendly interface with clear sections
- Real-time Results: Instant feedback and progress indicators
- File Browser: Easy file selection with drag-and-drop support
- Accessibility: Clear fonts, good contrast, keyboard navigation
🌐 Web Analyzer (NEW)
- HTTP Headers Analysis: Inspect HTTP response headers for any domain
- IP Resolver: Resolve domain names to IP addresses
- XSS Scanner: Scan URLs for potential XSS vulnerabilities
- Port Scanner: Scan open ports on a given domain
- Security Headers Check: Analyze security-related HTTP headers
- Login Page Discovery: Find login pages on a website
- Brute Force Login (Demo): Attempt login brute force (for demo/testfire.net)
- Modern Web UI: Accessible via browser, can be launched from the GUI or command line
📖 Usage Guide
Getting Started
- Launch the Application: Run
./run.shor use the desktop shortcut - Select a File: Click "Select Image" or enter a file path
- Choose Analysis: Select the type of analysis you want to perform
- View Results: Results appear in real-time in the interface
Common Use Cases
Image Analysis
- Load an image file
- Use "EXIF Data" to extract metadata
- Use "Location" to get GPS coordinates and address
- Use "Steganography" to check for hidden data
Cryptography
- Navigate to the Cryptography module
- Choose between Classical or Advanced crypto
- Select your cipher/algorithm
- Enter text or load a file
- Use Magic Hasher for hash identification and cracking
File Forensics
- Load any file type
- Use "String Analysis" to extract readable text
- Use "Binwalk" to find embedded files
- Use "Hex Viewer" for byte-level analysis
Web Analysis
- Navigate to the Web Analyzer module
- Use "HTTP Headers Analysis" to inspect HTTP response headers
- Use "IP Resolver" to resolve domain names to IP addresses
- Use "XSS Scanner" to scan URLs for potential XSS vulnerabilities
- Use "Port Scanner" to scan open ports on a given domain
- Use "Security Headers Check" to analyze security-related HTTP headers
- Use "Login Page Discovery" to find login pages on a website
- Use "Brute Force Login (Demo)" to attempt login brute force (for demo/testfire.net)
🛠️ System Requirements
Required System Tools (Auto-installed)
- tesseract-ocr: OCR engine for text extraction
- steghide: Steganography tool for data hiding/extraction
- exiftool: Metadata extraction and manipulation
- binwalk: Binary analysis and hidden file extraction
- zsteg: PNG/BMP steganography analysis
- hashcat: Password/hash cracking
- hash-identifier: Hash type identification
- ruby-full: Required for zsteg
Python Dependencies (Auto-installed)
- Core: Pillow, numpy, opencv-python, matplotlib
- Forensics: pytesseract, exifread, stegano, pyzbar
- Cryptography: cryptography, pycryptodome
- Utilities: geopy, qrcode, pypng, requests
- GUI: tkinter-tooltip
🔧 Configuration
Theme Customization
Edit src/ui/theme.py to customize colors and appearance.
Tool Configuration
Modify src/config/settings.py to adjust analysis parameters.
Adding Custom Tools
Extend the toolkit by adding new modules in the src/modules/ directory.
📁 Project Structure
ForensicsMainHand/
├── main.py # Main application entry point
├── run.sh # Launcher script (NEW!)
├── install.sh # Installation script
├── requirements.txt # Python dependencies
├── README.md # This file
├── LICENSE # License information
└── src/
├── config/ # Configuration files
├── core/ # Core analysis modules
├── modules/ # Feature modules
│ ├── cryptography/ # Cryptography tools
│ ├── file_analyzer/ # File analysis
│ ├── photo_analyzer/ # Image analysis
│ └── web_analyzer_project/ # Web analyzer (Flask app)
├── ui/ # User interface
└── utils/ # Utility functions
🎯 Use Cases
Digital Forensics
- Extract metadata from evidence images
- Analyze GPS coordinates for location tracking
- Detect hidden data in suspicious files
- Perform file carving on binary evidence
CTF Challenges
- Solve steganography challenges
- Crack classical and modern ciphers
- Identify and crack hash types
- Analyze binar
