MetadataForensics / Google-Location-History-Takeout-ParserLinks
This free tool parses Google Takeout Location History Exports or Google Semantic Location History Warrant Return Data in a forensic manner.
☆36Updated 3 months ago
Alternatives and similar repositories for Google-Location-History-Takeout-Parser
Users that are interested in Google-Location-History-Takeout-Parser are comparing it to the libraries listed below
Sorting:
- Search datasets for Bitlocker recovery files and triage live systems for Bitlocker keys.☆44Updated 7 months ago
- Digital Forensics Incident Response and Detection engineering: Análisis forense de artefactos comunes y no tan comunes. Técnicas anti-for…☆83Updated 3 weeks ago
- Regular Expressions List used in Digital Forensic Tasks☆88Updated 6 months ago
- Linux Baseline and Forensic Triage Tool - BETA☆57Updated 2 years ago
- A series of python scripts to extract information from Dark Web Applications☆12Updated 5 months ago
- Python based tool to extract forensic info from EventTranscript.db (Windows Diagnostic Data)☆69Updated last year
- Digital forensic analysis tool that provides a user-friendly interface for investigating disk images.☆181Updated 4 months ago
- FIT is a Python3 application for forensic acquisition of contents like web pages, emails, social media, etc. directly from the internet.☆85Updated 5 months ago
- A tool for fetching DFIR and other GitHub tools.☆24Updated 3 weeks ago
- A collaboration effort by the DFIR community to provide definitions (sometimes multiple) for common forensic terms!☆27Updated 2 years ago
- List of links and resources referred to in my SANS OSINT Summit 2023 Talk: "Tips & Tricks For Digital Dumpster Diving"☆41Updated last year
- A simple script to read the contents of a zip/tar/folder and extract metadata☆22Updated 4 months ago
- Windows Forensics Environment Builder☆156Updated last month
- ☆31Updated 4 months ago
- Parses USB connection artifacts from offline Registry hives☆101Updated 2 months ago
- Contains compiled binaries of Volatility☆34Updated 3 months ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆67Updated last year
- Case_Notes.py is a cross-platform (Windows, macOS, & Linux) python script to help make the documentation process easier.☆27Updated 2 years ago
- A hex viewer for the sleuths!☆20Updated 4 months ago
- ☆53Updated last week
- This tool parses Windows EVTX logs to extract login and logout sessions from a security.evtx file. It uses a Tkinter GUI to let you selec…☆31Updated 6 months ago
- Python script to walk a folder or a zip file for SQLite Databases☆38Updated last year
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆61Updated last year
- Computes the hashes of a favicon file and provides the search syntax for Shodan, Censys and Zoomeye☆49Updated last year
- Web app built to allow digital forensic professionals to search for the forensic tools that will parse artifacts from various apps.☆19Updated 3 months ago
- DriveFS Sleuth is a Python tool that automates investigating Google Drive File Stream disk artifacts, the tool has been developed based o…☆83Updated 8 months ago
- IOCs collected during day-to-day activities☆73Updated this week
- MS Graph Commands and Tools for Blue Teamers☆50Updated last year
- Sniffing out well-known threat groups☆52Updated last year
- Bash Script to extract GNU/Linux forensic artifacts for digital forensic analysis and incident response.☆43Updated 2 years ago