Digital Forensics XML packages in Python
☆18Jan 20, 2026Updated last month
Alternatives and similar repositories for dfxml_python
Users that are interested in dfxml_python are comparing it to the libraries listed below
Sorting:
- XML Schema for Digital Forensics XML☆35Feb 7, 2025Updated last year
- Single server/laptop grade file-observatory☆10Mar 30, 2023Updated 2 years ago
- A Postfix filter which takes a piped message and submits it to Cuckoo Sandbox☆11Apr 3, 2016Updated 9 years ago
- A persistent repository for PRONOM Research Week activities☆12May 26, 2021Updated 4 years ago
- Wrapper around hfsutils to generate DFXML for HFS-formatted disk images☆11Apr 20, 2018Updated 7 years ago
- The Python implementation of the AFF4 standard.☆45Nov 13, 2025Updated 3 months ago
- Home for TRANSITS materials☆25Jul 24, 2024Updated last year
- AFF4 Standard Documents☆29Feb 4, 2022Updated 4 years ago
- Binaries for the log2timeline projects and dependencies☆40Feb 8, 2026Updated 3 weeks ago
- Lists of not-suitable-for-work words as YARA rules☆29Feb 2, 2026Updated 3 weeks ago
- ☆36Jan 21, 2026Updated last month
- OASIS TC Open Repository: Validate patterns used to express cyber observable content in STIX Indicators☆29Feb 11, 2026Updated 2 weeks ago
- Automatic/Custom Destinations & LNK (MS-SHLLINK) Browser☆44Feb 21, 2026Updated last week
- Algorithms Course Repo☆26Apr 23, 2025Updated 10 months ago
- Incident Notification Platform by @NC3-LU☆11Updated this week
- A fork of the disktype disk and disk image format detection tool☆11Nov 16, 2016Updated 9 years ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- Dumping credentials through windbg and pykd☆41Sep 25, 2023Updated 2 years ago
- R package for working with data stored within VERIS framework☆13Dec 22, 2015Updated 10 years ago
- This tool automates and facilitates an Differential fault analysis attack on AES 128 with a fault injected between the 2 last MixColumns☆13Nov 9, 2022Updated 3 years ago
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆10Jan 26, 2026Updated last month
- Use Forgejo with Coolify just like GitHub! Native integration for browsing repos, automatic webhooks, and push-to-deploy☆13Jul 16, 2025Updated 7 months ago
- ☆10Apr 28, 2025Updated 10 months ago
- Security diagnostic quick start guide. Identifying the best measures and establishing specific security procedures for your organization.☆11May 29, 2019Updated 6 years ago
- Python class for interacting with Project Zomboid servers using RCON☆10Oct 17, 2025Updated 4 months ago
- A curated list of GPT agents for cybersecurity☆12Oct 2, 2024Updated last year
- SCRIPT TERMUX HACK AKUN FACEBOOK☆17Jul 27, 2024Updated last year
- Designed an android application using android studio 1.3, java, xml. This application is a digital version of the actual Monopoly game. I…☆10Sep 25, 2021Updated 4 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆56Feb 21, 2026Updated last week
- ☆14Dec 6, 2023Updated 2 years ago
- Jolly good library for SPIF/Label/Clearance handling☆11Jan 2, 2024Updated 2 years ago
- ☆10Jul 28, 2021Updated 4 years ago
- CLI Tools to open, extract and mount FTK Imager's AccessData AD1 forensic images on linux.☆17May 27, 2025Updated 9 months ago
- Ghidra's development plugins, scripts, contributing. Presentation☆13Aug 10, 2020Updated 5 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- tools for creating, inspecting and modifying torrent files☆13Jun 1, 2022Updated 3 years ago
- HP Data Protector Arbitrary Remote Command Execution☆11Aug 12, 2018Updated 7 years ago
- OSCP preparation☆12Sep 18, 2025Updated 5 months ago
- Sample of a Malicious baseband signed by Apple☆10May 12, 2022Updated 3 years ago