4144414D / pytruecryptLinks
Truecrypt volume parsing library
☆32Updated 5 years ago
Alternatives and similar repositories for pytruecrypt
Users that are interested in pytruecrypt are comparing it to the libraries listed below
Sorting:
- Carves EXEs from given data files, using intelligent carving based upon PE headers☆39Updated 8 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 9 years ago
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Updated 6 years ago
- Discover potential timestamps within the Windows Registry☆19Updated 11 years ago
- "Fuzzy matching" for SQLite databases☆30Updated 5 years ago
- Tool for checking passwords against TrueCrypt encrypted volumes and disks, and/or decrypting the data.☆42Updated 8 years ago
- Forensics triage tool relying on Volatility and Foremost☆25Updated 2 years ago
- Lite version of PDF X-RAY that uses no backend☆38Updated 14 years ago
- recover deleted information from sqlite files.☆62Updated 9 years ago
- Powerful commandline $MFT record editor.☆25Updated 10 years ago
- advanced code generator for John the Ripper☆13Updated 7 years ago
- Interrogate is a proof-of-concept tool for identification of cryptographic keys in binary material (regardless of target operating system…☆78Updated 6 years ago
- Extract, defang, resolve names and IPs from text☆23Updated 2 years ago
- ☆16Updated 9 years ago
- ☆12Updated 9 years ago
- SQBrite is a data recovery tool for SQLite databases☆42Updated 3 years ago
- Archive of the original "cold boot" attack tools from CITP at Princeton. The original links are broken.☆54Updated 8 years ago
- ☆22Updated 10 years ago
- GUI Tool to generate threat intelligence information in various formats☆44Updated 7 years ago
- DFF (Digital Forensics Framework)☆11Updated 5 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- Carve Windows Prefetch files from arbitrary binary data☆16Updated 8 years ago
- This python based milter (mail-filter) checks an incoming mail for suspicious VBA macro code in MS 20xx Office attachments (doc, xls, ppt…☆39Updated 4 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 8 years ago
- A GUI-based tool to perform security testing against the HDMI CEC (Consumer Electronics Control) and HEC (HDMI Ethernet Channel) protocol…☆31Updated 12 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago
- Truehunter☆30Updated 4 years ago
- A USB armory based USB sandbox☆21Updated 8 years ago
- ☆33Updated 13 years ago
- an experimental tool for forensic analysis of ExFAT filesystem☆21Updated 10 years ago