SkillAgentSearch skills...

ForensicsMainHand

Modern digital forensics toolkit: image, file, and cryptography analysis (EXIF, stego, ciphers, carving, OCR). By Dhype7 (NYX team).

Install / Use

/learn @Dhype7/ForensicsMainHand
About this skill

Quality Score

0/100

Supported Platforms

Universal

README

ForensicsMainHand 🔍

Credit: Project by Dhype7 (NYX team)

Note: This toolkit gives you all you need for forensics & penetration testing methodology.

A comprehensive digital forensics toolkit with a modern GUI, designed for image, file, and cryptography analysis. Built for CTFs, security research, and forensic investigations.


🚀 Quick Start

1. Download

git clone https://github.com/Dhype7/ForensicsMainHand.git
cd ForensicsMainHand

2. Install

sudo chmod +x install.sh run.sh
sudo ./install.sh

This automatically installs all dependencies and sets up the environment.

3. Run

./run.sh

Or use the desktop shortcut created during installation.


📥 Detailed Installation Guide

Prerequisites

  • Operating System: Kali Linux (recommended) or any Debian/Ubuntu-based Linux distribution
  • Python: 3.8 or higher (automatically installed by the script)
  • Root Access: Required for installing system tools

Automatic Installation (Recommended)

The install.sh script handles everything automatically:

# 1. Make the script executable
chmod +x install.sh

# 2. Run the installation (requires sudo)
sudo ./install.sh

What the installer does:

  • Updates package repositories
  • Installs system tools: tesseract-ocr, steghide, exiftool, binwalk, hashcat, zsteg, hash-identifier
  • Creates Python virtual environment
  • Installs all Python dependencies from requirements.txt
  • Sets up desktop shortcut
  • Verifies all installations

Manual Installation (Advanced Users)

If you prefer manual installation, you'll need to install:

System Tools:

sudo apt update
sudo apt install -y python3 python3-pip python3-tk python3-pil.imagetk tesseract-ocr steghide exiftool binwalk hashcat hash-identifier ruby-full
sudo gem install zsteg

Python Dependencies:

python3 -m venv venv
source venv/bin/activate
pip install -r requirements.txt

🎯 How to Run

Method 1: Using the Launcher Script (Recommended)

./run.sh

This script automatically:

  • Activates the virtual environment
  • Checks for required files
  • Launches the application

Method 2: Desktop Shortcut

After installation, a desktop shortcut is created. Simply double-click it to run.

Method 3: Manual Launch

source venv/bin/activate
python main.py

Method 4: Direct Python Execution

python3 main.py

Note: This requires all dependencies to be installed system-wide.

Method 5: Launch the Web Analyzer (Web UI)

You can launch the Web Analyzer in two ways:

From the command line:

python main.py --web

This will start a local web server. Open your browser and go to http://127.0.0.1:5000.

From the GUI:

  • Open the main application as usual (./run.sh or desktop shortcut)
  • Click the "Launch Web Analyzer" button on the main menu
  • A message will appear with the URL to open in your browser

🌟 Features

🖼️ Photo Analyzer

  • EXIF Data Extraction: Device info, timestamps, GPS coordinates
  • Location Analysis: Reverse geocoding with address lookup
  • Metadata Analysis: Comprehensive metadata with ExifTool
  • String Extraction: Find readable strings in files
  • Binwalk Integration: Hidden file and binary analysis
  • Steghide Integration: Hide/extract data in images
  • OCR: Extract text from images using Tesseract
  • QR/Barcode Analysis: Decode embedded QR codes and barcodes
  • File Carving: Recover embedded files from binary data
  • Hex Viewer: Visual byte-level file inspection

🔐 Cryptography Module

  • Classical Ciphers: Affine, Atbash, Bacon, Caesar, Playfair, Rail Fence, Rot13, Scytale, Substitution, Vigenère, XOR, Binary, and more
  • Advanced Crypto: RSA, AES, Blowfish, DES, RC4, OTP, Base64/32/16, SHA-256, MD5, HMAC
  • Magic Hasher: Identify hash types and crack hashes with hashcat integration
  • Modern UI: Split view for classical/advanced crypto, user-friendly interface
  • File Import/Export: Work with text files or binary files
  • Dynamic Parameters: Context-sensitive options
  • Real-time Feedback: Status bar with progress and error handling

📁 File Analyzer

  • Type Detection: Detect file type using magic bytes, mimetypes, and permissions, with user-friendly explanations
  • Extract Archive: Robust extraction for all major archive types, with password-protection detection
  • Compress File: Compress files/folders to zip, 7z, tar, gz, bz2, xz, lzma, rar, zst, ar, lz4 (with password support)
  • String Extraction: CTF-grade tool for ASCII/Unicode strings, filtering, unique toggle, min length, copy/save
  • File Carving: Carve embedded files using magic numbers, with save/filter/hex preview
  • Entropy Analysis: Windowed entropy calculation, bar graph, summary stats, and plain-language explanation
  • Stego Analysis: Runs multiple steganography and metadata tools (exiftool, binwalk, zsteg, steghide, outguess, strings, appended data check), with summary and save options
  • File Breaker: Password cracker for archives using John the Ripper and *2john tools, with wordlist selection and toolbar
  • Recursive Extraction: Recursively extract nested archives, with summary table and output folder access

🎨 Modern GUI

  • Dark/Light Theme: Professional themes with easy switching
  • Intuitive Layout: User-friendly interface with clear sections
  • Real-time Results: Instant feedback and progress indicators
  • File Browser: Easy file selection with drag-and-drop support
  • Accessibility: Clear fonts, good contrast, keyboard navigation

🌐 Web Analyzer (NEW)

  • HTTP Headers Analysis: Inspect HTTP response headers for any domain
  • IP Resolver: Resolve domain names to IP addresses
  • XSS Scanner: Scan URLs for potential XSS vulnerabilities
  • Port Scanner: Scan open ports on a given domain
  • Security Headers Check: Analyze security-related HTTP headers
  • Login Page Discovery: Find login pages on a website
  • Brute Force Login (Demo): Attempt login brute force (for demo/testfire.net)
  • Modern Web UI: Accessible via browser, can be launched from the GUI or command line

📖 Usage Guide

Getting Started

  1. Launch the Application: Run ./run.sh or use the desktop shortcut
  2. Select a File: Click "Select Image" or enter a file path
  3. Choose Analysis: Select the type of analysis you want to perform
  4. View Results: Results appear in real-time in the interface

Common Use Cases

Image Analysis

  1. Load an image file
  2. Use "EXIF Data" to extract metadata
  3. Use "Location" to get GPS coordinates and address
  4. Use "Steganography" to check for hidden data

Cryptography

  1. Navigate to the Cryptography module
  2. Choose between Classical or Advanced crypto
  3. Select your cipher/algorithm
  4. Enter text or load a file
  5. Use Magic Hasher for hash identification and cracking

File Forensics

  1. Load any file type
  2. Use "String Analysis" to extract readable text
  3. Use "Binwalk" to find embedded files
  4. Use "Hex Viewer" for byte-level analysis

Web Analysis

  1. Navigate to the Web Analyzer module
  2. Use "HTTP Headers Analysis" to inspect HTTP response headers
  3. Use "IP Resolver" to resolve domain names to IP addresses
  4. Use "XSS Scanner" to scan URLs for potential XSS vulnerabilities
  5. Use "Port Scanner" to scan open ports on a given domain
  6. Use "Security Headers Check" to analyze security-related HTTP headers
  7. Use "Login Page Discovery" to find login pages on a website
  8. Use "Brute Force Login (Demo)" to attempt login brute force (for demo/testfire.net)

🛠️ System Requirements

Required System Tools (Auto-installed)

  • tesseract-ocr: OCR engine for text extraction
  • steghide: Steganography tool for data hiding/extraction
  • exiftool: Metadata extraction and manipulation
  • binwalk: Binary analysis and hidden file extraction
  • zsteg: PNG/BMP steganography analysis
  • hashcat: Password/hash cracking
  • hash-identifier: Hash type identification
  • ruby-full: Required for zsteg

Python Dependencies (Auto-installed)

  • Core: Pillow, numpy, opencv-python, matplotlib
  • Forensics: pytesseract, exifread, stegano, pyzbar
  • Cryptography: cryptography, pycryptodome
  • Utilities: geopy, qrcode, pypng, requests
  • GUI: tkinter-tooltip

🔧 Configuration

Theme Customization

Edit src/ui/theme.py to customize colors and appearance.

Tool Configuration

Modify src/config/settings.py to adjust analysis parameters.

Adding Custom Tools

Extend the toolkit by adding new modules in the src/modules/ directory.


📁 Project Structure

ForensicsMainHand/
├── main.py                      # Main application entry point
├── run.sh                       # Launcher script (NEW!)
├── install.sh                   # Installation script
├── requirements.txt             # Python dependencies
├── README.md                    # This file
├── LICENSE                      # License information
└── src/
    ├── config/                  # Configuration files
    ├── core/                    # Core analysis modules
    ├── modules/                 # Feature modules
    │   ├── cryptography/        # Cryptography tools
    │   ├── file_analyzer/       # File analysis
    │   ├── photo_analyzer/      # Image analysis
    │   └── web_analyzer_project/ # Web analyzer (Flask app)
    ├── ui/                      # User interface
    └── utils/                   # Utility functions

🎯 Use Cases

Digital Forensics

  • Extract metadata from evidence images
  • Analyze GPS coordinates for location tracking
  • Detect hidden data in suspicious files
  • Perform file carving on binary evidence

CTF Challenges

  • Solve steganography challenges
  • Crack classical and modern ciphers
  • Identify and crack hash types
  • Analyze binar
View on GitHub
GitHub Stars5
CategoryDevelopment
Updated3mo ago
Forks0

Languages

Python

Security Score

67/100

Audited on Dec 18, 2025

No findings