davidpany / CDPO
CDPO is a tool to validate, de-duplicate, combine, query, and encrypt track data recovered from a breach.
☆15Updated 7 years ago
Alternatives and similar repositories for CDPO:
Users that are interested in CDPO are comparing it to the libraries listed below
- Mass Triage Tools☆20Updated last week
- Tool to parse SRU database☆24Updated 6 years ago
- RegRipper wrapper for simplified bulk parsing or registry hives☆9Updated 6 years ago
- Technical add-on to ingest json formatted volatility memory analysis plugin outputs☆13Updated 6 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Updated 6 years ago
- Force-Directed Graph Generator for Volatility Ouputs☆26Updated 5 years ago
- ☆39Updated 5 years ago
- Different DFIR and CTI utilities☆36Updated 4 years ago
- Tools for parsing Forensic images☆41Updated 6 years ago
- Synopsis is a tool to aid analysts reviewing browser history files by providing a high-level “synopsis” of key information.☆20Updated 6 years ago
- Carve NTFS USN records from binary data☆24Updated 7 years ago
- Parses IE's Automatic Crash Recovery Files☆16Updated 8 years ago
- Quick script to build host or investigation timelines using Carbon Black Response☆12Updated 6 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Updated 7 years ago
- Carve $MFT records from a chunk of data (for instance a memory dump)☆16Updated 8 years ago
- This is a repository from Adam Swan and I's presentation on Windows Logs Zero 2 Hero.☆22Updated 7 years ago
- Parses the WMI object database....looking for persistence☆31Updated 5 years ago
- A GC link parser for both linkfiles and jumplists.☆18Updated 8 years ago
- Crack your macros like the math pros.☆33Updated 8 years ago
- Extract common Windows artifacts from source images and VSCs☆65Updated 3 years ago
- LNK to JSON☆14Updated 5 years ago
- Exporting MISP event attributes to yara rules usable with Thor apt scanner☆24Updated 7 years ago
- Information about most important hunts which can be performed by Threat hunters while searching for any adversary/threats inside the orga…☆15Updated 5 years ago
- Fast incident overview☆39Updated 8 years ago
- A DFVFS Backed Forensic Viewer☆40Updated 4 years ago
- Volatility plugins created by the author☆44Updated 9 years ago
- Konrads' Pen-Ultimate (Windows) Log File Parser☆13Updated 2 years ago
- A rewrite of mactime, a bodyfile reader☆36Updated 6 months ago
- volatility-runner is a command line application designed to speed up memory forensics using the volatility framework, primarily for insta…☆11Updated 5 years ago
- onigiri - remote malware triage script☆25Updated 9 years ago