adulau / dcflddLinks
dcfldd - enhanced version of dd for forensics and security
☆70Updated 7 years ago
Alternatives and similar repositories for dcfldd
Users that are interested in dcfldd are comparing it to the libraries listed below
Sorting:
- Potiron - Normalize, Index and Visualize Network Capture☆88Updated 6 years ago
- The Official Github Repository of Daemonlogger☆22Updated 4 years ago
- AFF is an open and extensible file format to store disk images and associated metadata.☆91Updated 4 months ago
- Tools to assist in forensicating docker☆85Updated 10 months ago
- A USB armory based USB sandbox☆21Updated 8 years ago
- A FUSE module to mount captured network data☆40Updated 6 months ago
- The kernel patch and userspace tools to enable Linux software write blocking☆151Updated 5 years ago
- Forensic Analysis Tool for Btrfs File System.☆20Updated 7 years ago
- A simple command-line script to interact with the virustotal-api☆62Updated 7 years ago
- Digital Forensic Investigative Scripts☆85Updated 4 months ago
- A Spicy protocol analyzer for WireGuard☆29Updated 5 years ago
- MantaRay Automated Computer Forensic Triage Tool☆65Updated 6 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated last year
- Command line utility and Python package to ease the (un)mounting of forensic disk images☆124Updated 2 years ago
- hashdb block hash database tool and API☆45Updated 6 years ago
- Passwords of SSH Intruders Transferred to Text☆157Updated last year
- Passive DNS server interface compliant to "Common Output Format"☆10Updated 9 years ago
- Web of trust grapher☆38Updated 6 months ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆49Updated 2 months ago
- Extract, defang, resolve names and IPs from text☆23Updated 2 years ago
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆48Updated 8 years ago
- Ansible configurations for distributed MultiScanner installations☆14Updated 6 years ago
- "Fuzzy matching" for SQLite databases☆30Updated 5 years ago
- Stealth is a File Integrity scanner performing its work in a stealthy way.☆12Updated 7 years ago
- Foxhound: Blackbox - A Raspberry Pi NSM☆37Updated 7 years ago
- linux c++, fox-toolkit, multi-threaded forensic gui tool☆49Updated last year
- CEF plugin for audisp (Linux Audit)☆23Updated 9 years ago
- ☆70Updated 7 years ago
- A curated list of tools for incident response☆34Updated last year
- Passive Network Audit Framework☆32Updated 7 years ago