CDPO is a tool to validate, de-duplicate, combine, query, and encrypt track data recovered from a breach.
☆15Jun 23, 2017Updated 8 years ago
Alternatives and similar repositories for CDPO
Users that are interested in CDPO are comparing it to the libraries listed below
Sorting:
- Various scrips☆12Oct 19, 2022Updated 3 years ago
- Carve NTFS USN records from binary data☆27May 21, 2017Updated 8 years ago
- ☆14Feb 7, 2018Updated 8 years ago
- Registry to JSON. This Project is for learning purposes and is not maintained.☆12Dec 28, 2021Updated 4 years ago
- Library and tools to access the Windows SuperFetch database format☆13Nov 29, 2025Updated 3 months ago
- IOC-EDT is an open source web based tool for creating indicators of compromise in the OpenIOC (http://www.openioc.org) format.☆18May 10, 2014Updated 11 years ago
- Site for IWS book content☆17Oct 28, 2018Updated 7 years ago
- Library and tools to access the Windows Prefetch File (SCCA) format.☆83Dec 19, 2025Updated 2 months ago
- MacOS incident Response Toolkit. Mostly written while stuck on a NJTransit train.☆20Feb 20, 2020Updated 6 years ago
- Recover EXT filesystem info from carved directory blocks☆19Jun 23, 2017Updated 8 years ago
- Open Development projects for TekDefense☆78Oct 5, 2016Updated 9 years ago
- Extract GUIDs from .NET assemblies☆21Jun 15, 2016Updated 9 years ago
- Repository for LNK stuff☆31Aug 31, 2022Updated 3 years ago
- Binary commandline executable to parse ETL files☆69Jun 7, 2018Updated 7 years ago
- onigiri - remote malware triage script☆24Nov 5, 2015Updated 10 years ago
- Windows registry samples☆24Nov 18, 2018Updated 7 years ago
- Various Modules & Scripts for use with Viper Framework☆27Aug 20, 2019Updated 6 years ago
- Development guide for Volatility Plugins☆22Sep 6, 2017Updated 8 years ago
- Log Examination Tool☆27Oct 11, 2016Updated 9 years ago
- FireEye Alert json files to MISP Malware information sharing plattform (Alpha)☆32Jun 11, 2017Updated 8 years ago
- My Year of Python Repository☆28Jun 13, 2020Updated 5 years ago
- Binaries for the log2timeline projects and dependencies☆40Feb 8, 2026Updated 3 weeks ago
- VirusTotal Intelligence Notification Puller☆28Jun 29, 2016Updated 9 years ago
- Personal settings for X-Ways Forensics☆32Apr 28, 2022Updated 3 years ago
- Mitre chopshop network decoder framework☆31Oct 13, 2025Updated 4 months ago
- A companion Github repo for the book - Threat Hunting macOS by Jaron Bradley☆17Jul 26, 2025Updated 7 months ago
- An offensive Powershell console☆30Dec 5, 2015Updated 10 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11Updated this week
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- Wafid allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆10Oct 19, 2020Updated 5 years ago
- Tools for parsing Forensic images☆41Dec 14, 2018Updated 7 years ago
- AuditParser☆60Aug 28, 2013Updated 12 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Mar 16, 2018Updated 7 years ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆38Mar 14, 2017Updated 8 years ago
- ☆47Apr 10, 2023Updated 2 years ago
- Script for automating Linux memory capture and analysis☆274Feb 1, 2020Updated 6 years ago