CDPO is a tool to validate, de-duplicate, combine, query, and encrypt track data recovered from a breach.
☆15Jun 23, 2017Updated 8 years ago
Alternatives and similar repositories for CDPO
Users that are interested in CDPO are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Carve NTFS USN records from binary data☆27May 21, 2017Updated 8 years ago
- Registry to JSON. This Project is for learning purposes and is not maintained.☆12Dec 28, 2021Updated 4 years ago
- Library and tools to access the Windows SuperFetch database format☆13Nov 29, 2025Updated 3 months ago
- Library and tools to access the Windows Prefetch File (SCCA) format.☆83Dec 19, 2025Updated 3 months ago
- MacOS incident Response Toolkit. Mostly written while stuck on a NJTransit train.☆20Feb 20, 2020Updated 6 years ago
- Recover EXT filesystem info from carved directory blocks☆19Jun 23, 2017Updated 8 years ago
- ☆14Feb 7, 2018Updated 8 years ago
- Open Development projects for TekDefense☆78Oct 5, 2016Updated 9 years ago
- Various scrips☆12Oct 19, 2022Updated 3 years ago
- onigiri - remote malware triage script☆24Nov 5, 2015Updated 10 years ago
- Site for IWS book content☆17Oct 28, 2018Updated 7 years ago
- Binary commandline executable to parse ETL files☆69Jun 7, 2018Updated 7 years ago
- Windows registry samples☆24Nov 18, 2018Updated 7 years ago
- ☆13Apr 6, 2016Updated 9 years ago
- Personal settings for X-Ways Forensics☆32Apr 28, 2022Updated 3 years ago
- Log Examination Tool☆27Oct 11, 2016Updated 9 years ago
- A companion Github repo for the book - Threat Hunting macOS by Jaron Bradley☆19Jul 26, 2025Updated 7 months ago
- Binaries for the log2timeline projects and dependencies☆40Feb 8, 2026Updated last month
- Repository for LNK stuff☆31Aug 31, 2022Updated 3 years ago
- IOC-EDT is an open source web based tool for creating indicators of compromise in the OpenIOC (http://www.openioc.org) format.☆18May 10, 2014Updated 11 years ago
- macOS triage is a python script to collect various macOS logs, artifacts, and other data.☆25Mar 25, 2021Updated 4 years ago
- My Year of Python Repository☆28Jun 13, 2020Updated 5 years ago
- A simple toolkit on extracting RSA Software Tokens from RSA SecureID☆42May 6, 2020Updated 5 years ago
- ☆11Dec 9, 2025Updated 3 months ago
- Script for automating Linux memory capture and analysis☆274Feb 1, 2020Updated 6 years ago
- ☆85Nov 22, 2022Updated 3 years ago
- meaju is a free link shortener from Germany, which everyone can install on his own server.☆17Oct 17, 2019Updated 6 years ago
- Development guide for Volatility Plugins☆22Sep 6, 2017Updated 8 years ago
- Mitre chopshop network decoder framework☆31Oct 13, 2025Updated 5 months ago
- Extract GUIDs from .NET assemblies☆21Jun 15, 2016Updated 9 years ago
- The method and files used to generate Sysmon event logs, push them to a remote Splunk, and ingest/normalize the data for analysis.☆10Sep 28, 2020Updated 5 years ago
- A simple utility for stripping out either the SHA-1, MD5 or CRC values alone from the NSRL hash database☆14Nov 19, 2021Updated 4 years ago
- Library for Object Linking and Embedding (OLE) data types☆12Nov 27, 2025Updated 3 months ago
- Server for receiving autorun data from the clients☆13Sep 26, 2017Updated 8 years ago
- EVTXtract recovers and reconstructs fragments of EVTX log files from raw binary data, including unallocated space and memory images.☆209Mar 12, 2025Updated last year
- ☆11Apr 23, 2020Updated 5 years ago
- ☆52Sep 17, 2018Updated 7 years ago
- documentation, scripts, tools related to Zena Forensics (http://blog.digital-forensics.it)☆101Apr 21, 2017Updated 8 years ago
- Python-based cloud node for local use☆11Mar 7, 2018Updated 8 years ago