{"id":4968,"date":"2019-05-13T17:57:15","date_gmt":"2019-05-13T12:27:15","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=4968"},"modified":"2019-05-13T17:57:15","modified_gmt":"2019-05-13T12:27:15","slug":"panalizer","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/panalizer\/","title":{"rendered":"PAnalizer : Forensic Tool Search Images In A Specific Directory"},"content":{"rendered":"\n<p>PAnalizer is a forensic tool, you can search pornographic images in a specific directory, this is util in Pedestrian Detection. <\/p>\n\n\n\n<p>Also you can search a specific person in image set, is necessary give to the application a few pictures of the person of interest.<\/p>\n\n\n\n<p><strong>Also Read-  <a href=\"https:\/\/kalilinuxtutorials.com\/recon-t\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Recon-T : Reconnaisance \u2013 Footprinting \u2013 Information Disclosure (opens in a new tab)\">Recon-T : Reconnaisance \u2013 Footprinting \u2013 Information Disclosure<\/a><\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-Q7m75-ck5sY\/XNjplrnavVI\/AAAAAAAAAPw\/TJpVo2P4W9Q8nP0-zMA8Xv0PpapcMlC2gCLcBGAs\/s1600\/PAnalizer.png\" alt=\"\"\/><\/figure>\n\n\n\n<p>The objective is always to improve and innovate with informatics solutions, we look for problems, we deal with the challenges and we provide a technological response.<\/p>\n\n\n\n<div class=\"wp-block-button aligncenter is-style-squared\"><a class=\"wp-block-button__link has-background has-vivid-cyan-blue-background-color\" href=\"https:\/\/github.com\/AaronSoria\/PAnalizer\"><strong>Download<\/strong><\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>PAnalizer is a forensic tool, you can search pornographic images in a specific directory, this is util in Pedestrian Detection. Also you can search a specific person in image set, is necessary give to the application a few pictures of the person of interest. Also Read- Recon-T : Reconnaisance \u2013 Footprinting \u2013 Information Disclosure The [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[1243,2395],"class_list":["post-4968","post","type-post","status-publish","format-standard","hentry","category-kali","tag-forensic-tool","tag-panalizer"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>PAnalizer : Forensic Tool Search Images In A Specific Directory<\/title>\n<meta name=\"description\" content=\"PAnalizer is a forensic tool, you can search pornographic images in a specific directory, this is util in Pedestrian Detection.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/panalizer\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PAnalizer : Forensic Tool Search Images In A Specific Directory\" \/>\n<meta property=\"og:description\" content=\"PAnalizer is a forensic tool, you can search pornographic images in a specific directory, this is util in Pedestrian Detection.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/panalizer\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-13T12:27:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/1.bp.blogspot.com\/-Q7m75-ck5sY\/XNjplrnavVI\/AAAAAAAAAPw\/TJpVo2P4W9Q8nP0-zMA8Xv0PpapcMlC2gCLcBGAs\/s1600\/PAnalizer.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/panalizer\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/panalizer\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"PAnalizer : Forensic Tool Search Images In A Specific Directory\",\"datePublished\":\"2019-05-13T12:27:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/panalizer\/\"},\"wordCount\":87,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/panalizer\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-Q7m75-ck5sY\/XNjplrnavVI\/AAAAAAAAAPw\/TJpVo2P4W9Q8nP0-zMA8Xv0PpapcMlC2gCLcBGAs\/s1600\/PAnalizer.png\",\"keywords\":[\"Forensic Tool\",\"PAnalizer\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/panalizer\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/panalizer\/\",\"name\":\"PAnalizer : Forensic Tool Search Images In A Specific Directory\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/panalizer\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/panalizer\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-Q7m75-ck5sY\/XNjplrnavVI\/AAAAAAAAAPw\/TJpVo2P4W9Q8nP0-zMA8Xv0PpapcMlC2gCLcBGAs\/s1600\/PAnalizer.png\",\"datePublished\":\"2019-05-13T12:27:15+00:00\",\"description\":\"PAnalizer is a forensic tool, you can search pornographic images in a specific directory, this is util in Pedestrian Detection.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/panalizer\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/panalizer\/#primaryimage\",\"url\":\"https:\/\/1.bp.blogspot.com\/-Q7m75-ck5sY\/XNjplrnavVI\/AAAAAAAAAPw\/TJpVo2P4W9Q8nP0-zMA8Xv0PpapcMlC2gCLcBGAs\/s1600\/PAnalizer.png\",\"contentUrl\":\"https:\/\/1.bp.blogspot.com\/-Q7m75-ck5sY\/XNjplrnavVI\/AAAAAAAAAPw\/TJpVo2P4W9Q8nP0-zMA8Xv0PpapcMlC2gCLcBGAs\/s1600\/PAnalizer.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"PAnalizer : Forensic Tool Search Images In A Specific Directory","description":"PAnalizer is a forensic tool, you can search pornographic images in a specific directory, this is util in Pedestrian Detection.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/panalizer\/","og_locale":"en_US","og_type":"article","og_title":"PAnalizer : Forensic Tool Search Images In A Specific Directory","og_description":"PAnalizer is a forensic tool, you can search pornographic images in a specific directory, this is util in Pedestrian Detection.","og_url":"https:\/\/kalilinuxtutorials.com\/panalizer\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2019-05-13T12:27:15+00:00","og_image":[{"url":"https:\/\/1.bp.blogspot.com\/-Q7m75-ck5sY\/XNjplrnavVI\/AAAAAAAAAPw\/TJpVo2P4W9Q8nP0-zMA8Xv0PpapcMlC2gCLcBGAs\/s1600\/PAnalizer.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/panalizer\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/panalizer\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"PAnalizer : Forensic Tool Search Images In A Specific Directory","datePublished":"2019-05-13T12:27:15+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/panalizer\/"},"wordCount":87,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/panalizer\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-Q7m75-ck5sY\/XNjplrnavVI\/AAAAAAAAAPw\/TJpVo2P4W9Q8nP0-zMA8Xv0PpapcMlC2gCLcBGAs\/s1600\/PAnalizer.png","keywords":["Forensic Tool","PAnalizer"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/panalizer\/","url":"https:\/\/kalilinuxtutorials.com\/panalizer\/","name":"PAnalizer : Forensic Tool Search Images In A Specific Directory","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/panalizer\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/panalizer\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-Q7m75-ck5sY\/XNjplrnavVI\/AAAAAAAAAPw\/TJpVo2P4W9Q8nP0-zMA8Xv0PpapcMlC2gCLcBGAs\/s1600\/PAnalizer.png","datePublished":"2019-05-13T12:27:15+00:00","description":"PAnalizer is a forensic tool, you can search pornographic images in a specific directory, this is util in Pedestrian Detection.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/panalizer\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/panalizer\/#primaryimage","url":"https:\/\/1.bp.blogspot.com\/-Q7m75-ck5sY\/XNjplrnavVI\/AAAAAAAAAPw\/TJpVo2P4W9Q8nP0-zMA8Xv0PpapcMlC2gCLcBGAs\/s1600\/PAnalizer.png","contentUrl":"https:\/\/1.bp.blogspot.com\/-Q7m75-ck5sY\/XNjplrnavVI\/AAAAAAAAAPw\/TJpVo2P4W9Q8nP0-zMA8Xv0PpapcMlC2gCLcBGAs\/s1600\/PAnalizer.png"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":33060,"url":"https:\/\/kalilinuxtutorials.com\/awesome-anti-forensic\/","url_meta":{"origin":4968,"position":0},"title":"The Arsenal : A Comprehensive Guide To Anti-Forensic Tools And Techniques","author":"Varshini","date":"May 14, 2024","format":false,"excerpt":"Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attributes. This all includes tools to work with anything in general that makes changes to a system for the purposes of hiding information. Tools System\/Digital Image Afflib\u00a0: An extensible open format for the\u2026","rel":"","context":"In &quot;Forensics&quot;","block_context":{"text":"Forensics","link":"https:\/\/kalilinuxtutorials.com\/category\/f\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEihMQ2qxhf0ajcgiKbg7B6oyNRyWx6hwfIv4Vq2rkYSYZtSG-JdQ9pM9yj_xVCLYqzb0PGopZtGnxQY-N8eFoKz-MQClIR_lemtoMlT0BmVM96EfqKqftFl19Y5YgqbEJkpfjay9NxOhQa6sCLgTEMrLatRl5W0XQ-CMw5nabAVDW2r2qvxbD2Jox_BFv-U\/s16000\/Awesome%20Anti%20Forensic.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEihMQ2qxhf0ajcgiKbg7B6oyNRyWx6hwfIv4Vq2rkYSYZtSG-JdQ9pM9yj_xVCLYqzb0PGopZtGnxQY-N8eFoKz-MQClIR_lemtoMlT0BmVM96EfqKqftFl19Y5YgqbEJkpfjay9NxOhQa6sCLgTEMrLatRl5W0XQ-CMw5nabAVDW2r2qvxbD2Jox_BFv-U\/s16000\/Awesome%20Anti%20Forensic.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEihMQ2qxhf0ajcgiKbg7B6oyNRyWx6hwfIv4Vq2rkYSYZtSG-JdQ9pM9yj_xVCLYqzb0PGopZtGnxQY-N8eFoKz-MQClIR_lemtoMlT0BmVM96EfqKqftFl19Y5YgqbEJkpfjay9NxOhQa6sCLgTEMrLatRl5W0XQ-CMw5nabAVDW2r2qvxbD2Jox_BFv-U\/s16000\/Awesome%20Anti%20Forensic.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEihMQ2qxhf0ajcgiKbg7B6oyNRyWx6hwfIv4Vq2rkYSYZtSG-JdQ9pM9yj_xVCLYqzb0PGopZtGnxQY-N8eFoKz-MQClIR_lemtoMlT0BmVM96EfqKqftFl19Y5YgqbEJkpfjay9NxOhQa6sCLgTEMrLatRl5W0XQ-CMw5nabAVDW2r2qvxbD2Jox_BFv-U\/s16000\/Awesome%20Anti%20Forensic.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEihMQ2qxhf0ajcgiKbg7B6oyNRyWx6hwfIv4Vq2rkYSYZtSG-JdQ9pM9yj_xVCLYqzb0PGopZtGnxQY-N8eFoKz-MQClIR_lemtoMlT0BmVM96EfqKqftFl19Y5YgqbEJkpfjay9NxOhQa6sCLgTEMrLatRl5W0XQ-CMw5nabAVDW2r2qvxbD2Jox_BFv-U\/s16000\/Awesome%20Anti%20Forensic.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEihMQ2qxhf0ajcgiKbg7B6oyNRyWx6hwfIv4Vq2rkYSYZtSG-JdQ9pM9yj_xVCLYqzb0PGopZtGnxQY-N8eFoKz-MQClIR_lemtoMlT0BmVM96EfqKqftFl19Y5YgqbEJkpfjay9NxOhQa6sCLgTEMrLatRl5W0XQ-CMw5nabAVDW2r2qvxbD2Jox_BFv-U\/s16000\/Awesome%20Anti%20Forensic.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":7229,"url":"https:\/\/kalilinuxtutorials.com\/dfirtriage-digital-forensic-acquisition\/","url_meta":{"origin":4968,"position":1},"title":"DFIRTriage : Digital Forensic Acquisition Tool For Windows Based Incident Response","author":"R K","date":"November 12, 2019","format":false,"excerpt":"DFIRTriage is a Digital forensic acquisition tool for Windows-based incident response. This tool intended to provide Incident Responders with rapid host data. Written in Python, the code has been compiled to eliminate the dependency of python on the target host.\u00a0 The tool will run a variety of commands automatically upon\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":4088,"url":"https:\/\/kalilinuxtutorials.com\/imago-forensics\/","url_meta":{"origin":4968,"position":2},"title":"imago Forensics : A Python Tool That Extract Digital Evidences From Images","author":"R K","date":"March 7, 2019","format":false,"excerpt":"Imago is a python tool that extract digital evidences from images recursively. This tool is useful throughout a digital forensic investigation. If you need to extract digital evidences and you have a lot of images, through this tool you will be able to compare them easily. Imago allows to extract\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":33348,"url":"https:\/\/kalilinuxtutorials.com\/whapa\/","url_meta":{"origin":4968,"position":3},"title":"Whapa &#8211; Comprehensive Guide To The WhatsApp Forensic Toolset","author":"0xSnow","date":"March 6, 2026","format":false,"excerpt":"In an era dominated by messaging apps, WhatsApp has become a key platform for personal and professional communication. As WhatsApp messages often contain critical information, it's vital to have the means to extract and analyze them for security or forensic investigations. Whapa is a powerful toolset designed specifically for analyzing\u2026","rel":"","context":"In &quot;Forensics&quot;","block_context":{"text":"Forensics","link":"https:\/\/kalilinuxtutorials.com\/category\/f\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjUwoanb85whyphenhyphenEVKGf5mCfTreoXpxj2iQABLAW-dHaoFZfc4cX7hvKMcxTqXN7RwiVz843yz0j6y3nWZE38JRm1I4s0nCjxq2NYnIU_2xrZztAGx7cNUsgrDMZ-EwWk2KLXT_PuHxNNBALqg1wgdpWBOztTMcYrCyfumHbVzxEZggBFStAgmuIxEYAD2VJP\/s16000\/Whapa%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjUwoanb85whyphenhyphenEVKGf5mCfTreoXpxj2iQABLAW-dHaoFZfc4cX7hvKMcxTqXN7RwiVz843yz0j6y3nWZE38JRm1I4s0nCjxq2NYnIU_2xrZztAGx7cNUsgrDMZ-EwWk2KLXT_PuHxNNBALqg1wgdpWBOztTMcYrCyfumHbVzxEZggBFStAgmuIxEYAD2VJP\/s16000\/Whapa%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjUwoanb85whyphenhyphenEVKGf5mCfTreoXpxj2iQABLAW-dHaoFZfc4cX7hvKMcxTqXN7RwiVz843yz0j6y3nWZE38JRm1I4s0nCjxq2NYnIU_2xrZztAGx7cNUsgrDMZ-EwWk2KLXT_PuHxNNBALqg1wgdpWBOztTMcYrCyfumHbVzxEZggBFStAgmuIxEYAD2VJP\/s16000\/Whapa%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjUwoanb85whyphenhyphenEVKGf5mCfTreoXpxj2iQABLAW-dHaoFZfc4cX7hvKMcxTqXN7RwiVz843yz0j6y3nWZE38JRm1I4s0nCjxq2NYnIU_2xrZztAGx7cNUsgrDMZ-EwWk2KLXT_PuHxNNBALqg1wgdpWBOztTMcYrCyfumHbVzxEZggBFStAgmuIxEYAD2VJP\/s16000\/Whapa%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjUwoanb85whyphenhyphenEVKGf5mCfTreoXpxj2iQABLAW-dHaoFZfc4cX7hvKMcxTqXN7RwiVz843yz0j6y3nWZE38JRm1I4s0nCjxq2NYnIU_2xrZztAGx7cNUsgrDMZ-EwWk2KLXT_PuHxNNBALqg1wgdpWBOztTMcYrCyfumHbVzxEZggBFStAgmuIxEYAD2VJP\/s16000\/Whapa%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjUwoanb85whyphenhyphenEVKGf5mCfTreoXpxj2iQABLAW-dHaoFZfc4cX7hvKMcxTqXN7RwiVz843yz0j6y3nWZE38JRm1I4s0nCjxq2NYnIU_2xrZztAGx7cNUsgrDMZ-EwWk2KLXT_PuHxNNBALqg1wgdpWBOztTMcYrCyfumHbVzxEZggBFStAgmuIxEYAD2VJP\/s16000\/Whapa%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":12470,"url":"https:\/\/kalilinuxtutorials.com\/uac\/","url_meta":{"origin":4968,"position":4},"title":"UAC : Unix-like Artifacts Collector","author":"R K","date":"April 15, 2021","format":false,"excerpt":"UAC is a Live Response collection tool for Incident Response that makes use of built-in tools to automate the collection of Unix-like systems artifacts. It respects the order of volatility and artifacts that are changed during the execution. It was created to facilitate and speed up data collection, and depend\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":23234,"url":"https:\/\/kalilinuxtutorials.com\/autotimeliner\/","url_meta":{"origin":4968,"position":5},"title":"Autotimeliner : Automagically Extract Forensic Timeline From Volatile Memory Dump","author":"R K","date":"March 24, 2022","format":false,"excerpt":"Autotimeliner tool will automagically extract forensic timeline from volatile memory dumps. Requirements Python 3Volatilitymactime (from SleuthKit) (Developed and tested on Debian 9.6 with\u00a0Volatility 2.6-1\u00a0and\u00a0sleuthkit 4.4.0-5) How it works AutoTimeline automates this\u00a0workflow: Identify correct volatility profile for the memory image.Runs the\u00a0timeliner\u00a0plugin against volatile memory dump using volatility.Runs the\u00a0mftparser\u00a0volatility plugin, in order\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgm7fBSxQZj93eiSAn6gpZEriOVqFlNC28NrVTahqDIi6De-Tkpl3VHywgIhmvpcnuG_tJRyAyDvNgTqfcsup8WR1u4r2dDMiKTo8qYG6yFy9Vq-6djAuYy76O0de4YHNLtufDN-DiRORKW6y9n0UC8_NeloUfqqVxu1WVmIN50oaxcLlUWTuG1vmiP\/s728\/patch-tuesday-2022.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgm7fBSxQZj93eiSAn6gpZEriOVqFlNC28NrVTahqDIi6De-Tkpl3VHywgIhmvpcnuG_tJRyAyDvNgTqfcsup8WR1u4r2dDMiKTo8qYG6yFy9Vq-6djAuYy76O0de4YHNLtufDN-DiRORKW6y9n0UC8_NeloUfqqVxu1WVmIN50oaxcLlUWTuG1vmiP\/s728\/patch-tuesday-2022.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgm7fBSxQZj93eiSAn6gpZEriOVqFlNC28NrVTahqDIi6De-Tkpl3VHywgIhmvpcnuG_tJRyAyDvNgTqfcsup8WR1u4r2dDMiKTo8qYG6yFy9Vq-6djAuYy76O0de4YHNLtufDN-DiRORKW6y9n0UC8_NeloUfqqVxu1WVmIN50oaxcLlUWTuG1vmiP\/s728\/patch-tuesday-2022.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgm7fBSxQZj93eiSAn6gpZEriOVqFlNC28NrVTahqDIi6De-Tkpl3VHywgIhmvpcnuG_tJRyAyDvNgTqfcsup8WR1u4r2dDMiKTo8qYG6yFy9Vq-6djAuYy76O0de4YHNLtufDN-DiRORKW6y9n0UC8_NeloUfqqVxu1WVmIN50oaxcLlUWTuG1vmiP\/s728\/patch-tuesday-2022.png?resize=700%2C400&ssl=1 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/4968","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=4968"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/4968\/revisions"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=4968"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=4968"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=4968"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}