adulau / dcflddLinks
dcfldd - enhanced version of dd for forensics and security
☆70Updated 7 years ago
Alternatives and similar repositories for dcfldd
Users that are interested in dcfldd are comparing it to the libraries listed below
Sorting:
- Potiron - Normalize, Index and Visualize Network Capture☆88Updated 6 years ago
- Digital Forensic Investigative Scripts☆84Updated last month
- The Official Github Repository of Daemonlogger☆22Updated 4 years ago
- Tools to assist in forensicating docker☆84Updated 7 months ago
- ☆70Updated 7 years ago
- A Spicy protocol analyzer for WireGuard☆29Updated 5 years ago
- A simple command-line script to interact with the virustotal-api☆61Updated 7 years ago
- AFF is an open and extensible file format to store disk images and associated metadata.☆91Updated last month
- MantaRay Automated Computer Forensic Triage Tool☆65Updated 6 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- Foxhound: Blackbox - A Raspberry Pi NSM☆37Updated 7 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Updated 5 years ago
- A USB armory based USB sandbox☆21Updated 8 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated last year
- The kernel patch and userspace tools to enable Linux software write blocking☆146Updated 5 years ago
- hashdb block hash database tool and API☆45Updated 6 years ago
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆48Updated 8 years ago
- Forensic Analysis Tool for Btrfs File System.☆21Updated 7 years ago
- "Fuzzy matching" for SQLite databases☆30Updated 5 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆38Updated last year
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆49Updated last month
- Web of trust grapher☆38Updated 4 months ago
- Transparent network tap☆119Updated 10 years ago
- Stealth is a File Integrity scanner performing its work in a stealthy way.☆12Updated 7 years ago
- Defensomania is a security monitoring and incident response card game.☆63Updated 2 years ago
- pcqf (PC Quick Forensics) helps quickly gathering forensic evidence from Windows, Mac, and Linux systems, in order to identify potential …☆135Updated 2 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆54Updated last week
- Parse IE, FireFox, Chrome and Safari Cookies for Google Analytic values☆23Updated 9 years ago
- Passive Network Audit Framework☆32Updated 7 years ago
- Recursively validate a starting directory of file contents to identify changes, corrupt data☆37Updated 5 years ago