Support via OpenText Software Support, with a ticket filed against the associated product.
PARTNER
OpenText offers a content partnership program for select partners. Support for Partner Content offerings is provided by the partner and not by OpenText of the OpenText community.
OpenText COMMUNITY
OpenText Community Content is provided by OpenText for the benefit of customers, support for it is not available via OpenText Software Support but through specific community content forums.
COMMUNITY
Community Contributed Content is provided by OpenText customers and supported by them.
The downloads referenced under the "Cybersecurity Early Access" category are made available to subscribers to mitigate time-critical issues but have not undergone formal quality and performance testing associated with official OpenText/Cybersecurity product releases.
OpenText has a multi-stage Quality Assurance process. During Stage 1 we conduct a resource analysis, field mapping, ensure content level 1 functionality and analysis in our sandbox environment.
Stage 2 is a complete validation including production validation. This package has cleared Stage 1 validation and therefore should be deployed with the appropriate pre-production validation.
OpenText strongly recommends that any downloaded content is first checked and tested thoroughly in a non-production environment before committing to production.
We welcome feedback and, should any content be shown to be faulty, detrimental or carry an incorrect claim of authorship, we shall endeavor to remove or correct such content as promptly as reasonably possible once notified and validated.
OpenText |
OpenText
Community
EnCase Integrated Threat Toolkit (EITT) is a GUI interface and aggregate for a number of EnCase® Enterprise functions and over 15 open source tools designed to assist in DFIR investigations.
EITT was created to assist DFIR investigators with OSTs. The toolkit comes more than 15 integrated modules allowing an investigator to quickly locate and annihilate cyber threats against their enterprise. EITT was developed by the Professional Services team at Guidance Software to be a must-have addition to any DFIR workflow.
This free download includes the EITT installer and user guide. An unlimited release version that allows simultaneous endpoint connections is available with EnCase EndPoint Security.
Note: The EnCase Integrated Threat Toolkit is designed for use with EnCase v7.
Cyber Analysis Modules:
-RAM Dump
-Strings
-MD5
-RegRipper
-PDF Tool Analysis
-Volatility for Windows, Linux and Mac
-Plaso - Log2Timeline
-Plaso - Psort
-Reverse Shell Module
Investigative Script Modules:
-MFT Parser
-UsnJrnl Parser
- Registry Parser
-Find Temp Executable Search
-Extension/Path Search
-PST Timeline
MFT Parser: Parses the $MFT on any Windows OS.
UsnJrnl Parser: Parses the $UsnJrnl on any Windows OS.
PreFetch Parser: Parses the Prefetch folder located on Windows OS and looks for any file with the extension of ".pf."
MWD Registry Parser: Looks for any type of binary value located in the Windows Registries. It will use a "Blacklist Path" file if provided and will ignore any "Whitelist Path" files.
Find Temp Executable Search: Searches an Operating System looking for any executables located in any temp directory on the system.
Malware Entropy Date Range Search: Searches a Target system for any file that has an Entropy value above the value provided in the Entropy field.
Known Malware Paths: Searches a Target system for any file path/extension that is contained in a provided "Blacklist" and/or has an Entropy value above the value provided in the Entropy field.
RAM Dump: The acquisition of memory from a target machine. This module will launch EnCase Enterprise in the background and acquire the image, placing it in a Logical Evidence File (LEF) for future use.
Strings: Uses the System Internals (owned by Microsoft®) strings.exe that parses through any file and provides a resulting text file with any ASCII character located in the target file.
MD5 Module: Searches for any MD5 value provided, individually or in a text file.
RegRipper Module: Allows the user to process multiple Registry Hive files across an endpoint. The Registry hives will be copied into the output folder as native files as well as contained in a LEF for future use. Each "plugin" or "Profile" will be processed against the required hive file, and an output result will be placed in the ToolLogs subfolder for review.
PDF Parser: Uses PDFID to run the Triage, Name Obfuscation and Embedded File plugins?dentifying the fundamental elements of PDF files.
Volatility for Windows, Linux and Mac: Uses the Open Source Volatility Framework to parse and analyze memory dumps from the respective systems.
Plaso (Log2Timeline and Psort) incorporated the Super Timeline Analysis functionality into a GUI Interface.
Reverse Shell Module provides the ability to create an embedded command shell onto the EITT from a Target Machine.
PST Timeline gives the ability to process a timeline from a provided PST file.
You are receiving release updates for this item because you have subscribed to the following products:
If you unsubscribe, you will no longer receive any notifications for these products.
Tip: to update your subscription preferences, go to Manage Subscriptions from your Dashboard, uncheck the products you no longer want to receive notifications for, and click 'Save'.
Since you are downloading an app from the OpenText Marketplace, you need to accept the updated Marketplace Terms of Service before you can continue. Use the link to review the Marketplace Terms of Service. Once complete check the, "I accept the Marketplace Terms of Service" box below and click accept to continue your download.
Your download has begun...
Your download has begun
Click here to get notified when new versions of this app are released
You are now subscribed to updates for this app
Related content and resources
Your browser is not supported!
Please upgrade to one of the following broswers: Internet Explorer 11 (or greater) or the latest version of Chrome or Firefox
release-rel-2025-2-1-6322 | Wed Feb 5 16:30:41 PST 2025