dcfldd - enhanced version of dd for forensics and security
☆71Jun 17, 2018Updated 7 years ago
Alternatives and similar repositories for dcfldd
Users that are interested in dcfldd are comparing it to the libraries listed below
Sorting:
- A rewrite of mactime, a bodyfile reader☆39Aug 5, 2024Updated last year
- Extract common Windows artifacts from source images and VSCs☆64May 10, 2021Updated 4 years ago
- Bolster NEO API - Artificial intelligence based zero-hour phishing detection☆13Aug 10, 2021Updated 4 years ago
- Automating forensic data extraction, reduction, and overall triage of cold disk and memory images.☆21Mar 12, 2019Updated 6 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆41Jan 20, 2023Updated 3 years ago
- A DFVFS Backed Forensic Viewer☆42Apr 13, 2020Updated 5 years ago
- Spec for the Flat Image Tree (FIT) specification☆14Jan 30, 2026Updated last month
- R-CSIRT Linux Triage tool☆39Jun 28, 2018Updated 7 years ago
- macOS triage is a python script to collect various macOS logs, artifacts, and other data.☆25Mar 25, 2021Updated 4 years ago
- Jupyter Notebooks for Digital Forensics & Incident Response☆10Nov 23, 2021Updated 4 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Apr 30, 2021Updated 4 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Jan 18, 2022Updated 4 years ago
- GUI for regripper☆11Mar 19, 2019Updated 6 years ago
- Digital Forensics and Incident Response notes and Autopsy tool walkthrough☆11Feb 3, 2022Updated 4 years ago
- Man-in-the-middle against Tor bridges☆28Feb 9, 2020Updated 6 years ago
- Utilities for the memory forensics framework☆22Jul 31, 2018Updated 7 years ago
- pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching☆12Jun 4, 2022Updated 3 years ago
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆11Dec 8, 2021Updated 4 years ago
- Collection of offensive tools targeting Microsoft Azure☆10Jun 9, 2022Updated 3 years ago
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆11Apr 2, 2022Updated 3 years ago
- Fast ssdeep comparison library☆13Nov 3, 2014Updated 11 years ago
- a drop-in replacement for Nmap powered by shodan.io☆10Apr 5, 2022Updated 3 years ago
- Automated network asset, email, and social media profile discovery and cataloguing.☆13Jan 6, 2022Updated 4 years ago
- Some dfir stuff☆31Jan 12, 2022Updated 4 years ago
- .NET library written in C# to load and access firmware files easily☆13Mar 2, 2022Updated 3 years ago
- Network Forensics Workshop Files☆17Apr 21, 2015Updated 10 years ago
- Napkin is a simple tool to produce statistical analysis of a text☆12Feb 25, 2024Updated 2 years ago
- upstream for seccheck☆15Jun 11, 2018Updated 7 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Jan 1, 2020Updated 6 years ago
- Megatron - A System for Abuse- and Incident Handling☆45Mar 29, 2017Updated 8 years ago
- Windows 10 Live Information viewer☆38Jan 27, 2022Updated 4 years ago
- MantaRay Automated Computer Forensic Triage Tool☆65Feb 19, 2019Updated 7 years ago
- This tool will resolve a list of Domains, IPs, Hosts, URLs and save the results for valid/invalid fast!☆16Aug 19, 2022Updated 3 years ago
- Tools used by CSIRT and especially in the scope of CNW☆18Updated this week
- Red Teaming Tactics and Techniques☆13Feb 10, 2022Updated 4 years ago
- Dump of organized knowledge on DFIR☆138Oct 4, 2021Updated 4 years ago
- A simple CLI tool to check WebDAV vulnerability☆14Aug 13, 2021Updated 4 years ago
- A Python parser for Rich Headers☆15Jun 2, 2015Updated 10 years ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Updated this week