Tools

BFIP (Bulk Forensic Image Processor)
BFIP (Bulk Forensic Image Processor) simplifies and accelerates forensic media processing at scale. Whether you’re a Griffeye Core user, Griffeye Advanced, or running standalone, BFIP streamlines case setup, bulk evidence ingestion, and file processing—no scripting or command-line work required.
At its core is the exclusive Breakpoint Processing Engine (BPE), delivering powerful carving and extraction from allocated, deleted, and unallocated space—including full APFS support and automated VICS packaging. BPE also provides a unique solution for automated unallocated file handling in Griffeye Collaboration Server, a capability not natively available.
BFIP can also act as a visual front-end for the Griffeye Processing Engine (GPE), removing the complexity of CLI operations while offering real-time logging, multi-mode workflows (Standard, LACE, BPE), and blazing-fast multithreaded performance.

Read More…

  • **BFIP 5.2 or newer requires Griffeye Magnet 24.3.x or newer for full Griffeye integration.

 

Current Release:
Version 5.4
4/21/2025
Download:
BFIP 5.4
MD5:
6fc7d720ab4a8caf0bdc73ebc17a223f

Changelog

 

 

 
Legacy Release:
  • **For Griffeye Analyze DI 24.2.x or earlier.
Version 5.1
2/29/2024
Download:
BFIP 5.1
MD5:0e220339cfb817242971e8ce1475e45d

 

 

FastHash

Simple multithreaded MD5 file hashing utility.

 

3 Different Processing Options:
1.Drop the executable in a directory of files and/or folders you want to process and then simply run FastHash. It will recursively process the hash values of all files in the same directory and any subdirectories. 
2.Drag and drop a folder containing any files you want to hash onto the FastHash executable, and it will recursively hash all files in the folder/subfolders.
3.Drag and drop a single file onto the FastHash executable, and it will hash just that file.
 
Results are then saved to both simple text file and more detailed CSV.
Current Release:
Version 1.2
2/22/2024
Download:
FastHash
MD5:
f76f0b86cbd5eebef9c84ffa6441e2ec
FileSifter
FileSifter is a digital forensics live-triage collection tool designed for deployment across multiple OS platforms including Windows, MacOS, and Linux.

Primary Features

-Live File Collection to either ZIP or TAR packages, and/or VICS JSON Packages.
-Keyword Filtering function.  Allows import of custom keyword dictionary file that when enabled will only collect files with match in keyword list.
-Easy targeting of files/folders to be collected using simple user interface and case setup.
-Support for targeted collection of Image, Video, Archives, and/or Documents and packaging into VICS JSON evidence package for easy import and review into tools such as Griffeye Analyze.
-Automatically generates CSV report for all files collected storing original metadata such as MAC times, paths, etc.
-Forensically sound. When FileSifter is executed from a forensic collection drive, program data, reports, and other generated data is only saved to the examiners connected drive.
Current Release:
Version 1.3.7
1/2/2023
Description

Changelog

Download:
FileSifter(Windows)
MD5: 7718934bab41dd0172bae67c9ced4fb4
FileSifter(MacOS)
MD5:3e43c535fec3d68ffedca4f15ec6ba15
FileSifter(Linux)
MD5:35653d2453875033b5fd398d46813723
FileSifter – User Manual
MD5:4f3240337b90b1adfd954f5a5e0a65e4
GK Password Parser
Simple utility that parses either the passwords text file, or PC History file, generated from IOS Graykey dumps. 
Password List:
The passwords file is parsed based on user selectable minimum/maximum password size, and a simple trimmed and sorted list of passwords is generated.
Quickly pair down what can be a very large list of data, filled with long complex tokens, and identify the clear-text passwords immediately.     
Passcode History:
Ingests the Passcode History file generated from Graykey Full Filesystem extractions and automates the ability to brute-force the historic 4/6 digit pin-codes using an integrated version of Hashcat.
Current Release:
Version 1.5 — 12/27/2023 
Download:
GK Password Parser
MD5:1ef37ce13f9800f20d9be7bfb4bc663c
1.5 Changelog

 

NSRL RDSv3 Hash Converter

Breakpoint NSRL Converter

 
Breakpoint NSRL Converter is a modern rewrite of the original NSRLConvert utility first introduced by AskClees, purpose-built to streamline forensic workflows by extracting usable hash sets from the massive SQLite-based NIST NSRL databases. Instead of forcing forensic tools to parse the full 120GB+ SQLite files—often resulting in long delays or outright import failures—Breakpoint NSRL Converter pulls just the essential hash values (MD5 or SHA1) and exports them in lightweight .txt or Project VIC-style .json formats. 
Provided in easy to use executable package, as well as open-sourced Python code.

🔍 Why use Breakpoint NSRL Converter?

  • Reduces hash file size drastically for faster, more reliable importing into tools like Griffeye, Autopsy, AXIOM, and others.

  • Eliminates import failures caused by unsupported or oversized SQLite hash sets.

  • 🔄 Supports both MD5 and SHA1 extraction, with user-selectable formats.

  • 🧠 Auto-detects NSRL schema style (minimal or full) and adapts accordingly.

  • 📦 JSON export supports Project VIC structure, for maximum flexibility.

Whether you’re filtering out known-good system files or preparing targeted hash sets, Breakpoint NSRL Converter ensures compatibility, efficiency, and results you can count on.

Current Release:
Version 1.1
5/20/2025
Downloads:
NIST NSRL Hash Converter
MD5:9e8fa4820c09bfd9a9136c65781a6b85

Source Code

** Command Syntax: **
BreakpointNSRLConverter.exe [input database] [outputFilePath] [hash_type] [output_format]
hash_type is optional, but can be 'md5' (default) or 'sha1'
output_format is optional, can be 'text' (default) or 'json'(ProjectVIC)
PackNHash Auto Archiver
Auto Archiving Utility to bulk archive, validate, hash, and prep complex project folder structures to individual archives.
  • GUI driven for easy configuration.
  • Generates unique logs for each case folder containing:
    • Full directory listing
    • File integrity verifications logs
    • Hashing of generated archives
Current Release:
Version 4.5
5/7/2025
Downloads:
PacknHash Auto Archiver
MD5:
33e25051108da087117dc4e634bf3599
PackNHash 4 User Guide

Changelog

More Information

Samsung Secure Health Data Parser
The Samsung Secure Health Data Parser is a forensic tool designed to extract and analyze data from Samsung Health databases. With the increasing importance of health-related data in digital forensics, this tool simplifies the process of extracting critical information, such as exercise data, step counts, and live activity tracking, stored in Samsung Health databases.

The tool offers both a GUI and command-line interface, making the secure Samsung Health database listed below, accessible to forensic investigators.
/data/data/com.sec.android.app.shealth/databases/SecureHealthData.db

GUI driven for easy use.

  • +Opensource

  • +GUI or CLI

  • +Polished HTML and Excel Reports

SHealthDBParser.exe

Source Code

MD5 Verification: f5195cc46b42200543ca4593369cecae

Read More

VICS JSON Builder
Provides a standalone version of the VICS JSON Utility from BFIP4Griffeye.
Ingests standard output from BFIP and/or PhotoRec and builds a VICS compliant JSON for import into tools such as Griffeye. 
Can be used independently from BFIP4Griffeye to manually generate a VICS compliant JSON from contents of folder.
Includes Universal VICS JSON Format Cleaning tool.  Corrects JSON file formatting by adding missing line-breaks and indentation for easier viewing. 
  • GUI driven for easy use.
  • Opensource

jsonbuilder3.exe

Source Code

MD5 Verification: c91472f17f2d5343a6f1ce20ab02edf7

Support Request