Some of the tools included in The Sleuth Kit include6:
The Sleuth Kit can be used
Parasram, Shiva V. N. (2017). Digital forensics with Kali Linux: perform data acquisition, digital investigation, and threat analysis using Kali Linux tools. Birmingham, UK. ISBN 978-1-78862-957-7. OCLC 1020288734.{{cite book}}: CS1 maint: location missing publisher (link) 978-1-78862-957-7 ↩
Altheide, Cory (2011). Digital forensics with open source tools: using open source platform tools for performing computer forensics on target systems: Windows, Mac, Linux, UNIX, etc. Harlan A. Carvey. Burlington, MA: Syngress. ISBN 978-1-59749-587-5. OCLC 713324784. 978-1-59749-587-5 ↩
"About". www.sleuthkit.org. Brian Carrier. Retrieved 2016-08-30. http://www.sleuthkit.org/about.php ↩
"The Coroner's Toolkit (TCT)". http://www.porcupine.org/forensics/tct.html ↩
"File and Volume System Analysis". www.sleuthkit.org. Brian Carrier. Retrieved 2016-08-30. http://www.sleuthkit.org/sleuthkit/desc.php ↩
"TSK Tool Overview - SleuthKitWiki". wiki.sleuthkit.org. Retrieved 2025-05-14. https://wiki.sleuthkit.org/index.php?title=TSK_Tool_Overview ↩
"Autopsy: Lesson 1: Analyzing Deleted JPEGs". www.computersecuritystudent.com. Retrieved 2020-06-20. https://www.computersecuritystudent.com/FORENSICS/AUTOPSY/lesson1/index.html ↩
"FS Analysis - SleuthKitWiki". wiki.sleuthkit.org. Retrieved 2020-06-20. https://wiki.sleuthkit.org/index.php?title=FS_Analysis ↩
"The Sleuth Kit - analyze disk images and recover files". LinuxLinks. Retrieved 2020-06-20. https://www.linuxlinks.com/thesleuthkit/ ↩