adulau / dcflddLinks
dcfldd - enhanced version of dd for forensics and security
☆70Updated 7 years ago
Alternatives and similar repositories for dcfldd
Users that are interested in dcfldd are comparing it to the libraries listed below
Sorting:
- Potiron - Normalize, Index and Visualize Network Capture☆88Updated 6 years ago
- Digital Forensic Investigative Scripts☆83Updated 2 weeks ago
- ☆70Updated 7 years ago
- Tools for Network Archaeology (internet protocol analysis)☆29Updated this week
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆48Updated 8 years ago
- Tools to assist in forensicating docker☆84Updated 6 months ago
- Forensic Analysis Tool for Btrfs File System.☆21Updated 7 years ago
- "Fuzzy matching" for SQLite databases☆30Updated 5 years ago
- Foxhound: Blackbox - A Raspberry Pi NSM☆37Updated 7 years ago
- An any-snarf program that processes application protocols (HTTP/FTP/...) from tcpdump or snoop files and stores session and file data☆233Updated 4 years ago
- A simple command-line script to interact with the virustotal-api☆61Updated 7 years ago
- Transparent network tap☆119Updated 9 years ago
- The Official Github Repository of Daemonlogger☆22Updated 4 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- MantaRay Automated Computer Forensic Triage Tool☆63Updated 6 years ago
- Command line utility and Python package to ease the (un)mounting of forensic disk images☆124Updated 2 years ago
- Web of trust grapher☆38Updated 3 months ago
- This is a mini-firewall that completely isolates a target device from the local network.☆309Updated 11 years ago
- AFF is an open and extensible file format to store disk images and associated metadata.☆90Updated 2 weeks ago
- CEF plugin for audisp (Linux Audit)☆23Updated 9 years ago
- Stealth is a File Integrity scanner performing its work in a stealthy way.☆12Updated 7 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 11 months ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Updated 5 years ago
- Collection of Auditd Examples and Presentations☆85Updated 4 years ago
- Network Block Device Server for windows with a DFIR/forensic focus.☆98Updated 8 years ago
- The kernel patch and userspace tools to enable Linux software write blocking☆146Updated 5 years ago
- Passive Network Audit Framework☆32Updated 7 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆49Updated 3 weeks ago
- Traceroute improved wrapper for CSIRT and CERT operators☆38Updated 11 months ago
- hashdb block hash database tool and API☆45Updated 6 years ago