Computer Forensics Tools & Techniques Catalog

Updating tool and technique information

Your name and a working email address are required to submit a tool or technique update (the email address entered will be used to validate the update submission). Please enter your contact information and review the fields below. Make any necessary changes and then click the submit button to proceed.

Contact information

Your name:
Your email address:

General tool / technique information

Tool / technique name:
Version:
Release date:
URL to tool / technique description:
Developer name:
Developer website URL:
Available test reports  (e.g., report title + where or from whom it may be obtained; use semicolons for multiple reports):
Comments:

Detailed tool / technique information

Select the parameter values that best describe the tool or technique. Ctrl-click (Cmd-click for Macs) to select multiple values for a parameter.

Forensic Functionality:Hash Analysis
Technical Parameters: Tool host OS / runtime environment: Hash computation: Supported hash algorithms: Create and manage hashsets: Hash search- use of hashes or hash sets to identify files/objects of interest: Hash elimination- use of hash sets to filter out files/objects (e.g., "known good" or "known benign" files): Hash de-duplication- use of hashes to eliminate identical files/objects: