
English – Autopsy
Autopsy does not have the ability to acquire data from a drone, but it can analyze the disk image, find the “.dat” files, and make artifacts that can be displayed in the main UI tree and as track points in the …
Autopsy - About
Autopsy is the premier open source forensics platform which is fast, easy-to-use, and capable of analyzing all types of mobile devices and digital media. Its plug-in architecture enables extensibility …
Autopsy - Law Enforcement Bundle
Accelerate CSAM investigations using the Law Enforcement Bundle, modules that extend Autopsy by integrating the latest data from Project VIC and C4P/All. Automatically identify and categorize known …
Autopsy - Autopsy 4.22.0: BitLocker Support, Cyber Triage Sidecar ...
Autopsy 4.22.0 includes BitLocker support, ability to run alongside Cyber Triage, and updates to lower-level libraries.
Autopsy 4.19.0 with Hosts, Analysis Results, and OS Accounts
Aug 2, 2021 · We’re happy to announce that we’ve aligned Autopsy with our Cyber Triage tool so that they use the same database, so many of the features that came into Autopsy were with the help of …
Autopsy - Video Triage
By integrating directly in the Autopsy user interface, this module provides law enforcement, intelligence analysts, and investigators an efficient triage capability for video content.
Autopsy - Use Cases
Investigators of all stripes can find value in using Autopsy as a primary forensic tool, an extension of their current forensic toolset, and/or as a way to validate findings from other tools.
Autopsy - Community
© 2026 SLEUTH KIT LABS. ALL RIGHTS RESERVED. Terms of Use Privacy Policy
Autopsy - Triage Media With Autopsy 4.4.0
With the new Autopsy 4.4.0 release, we introduced some new triage features that help you more quickly answer some questions about a hard drive or smart phone. The goal of this blog is to give you an …
Autopsy - Malware Scanner Ingest Module
What Does It Do The Malware Scanner Ingest Module uses Cyber Triage Cloud to identify if any executables in a data source are malware based on the executable’s md5 hash. Configuration …