c-aff4
An open source format for storing digital evidence and data, with a C/C++ library for creating, reading, and manipulating AFF4 images.

c-aff4
An open source format for storing digital evidence and data, with a C/C++ library for creating, reading, and manipulating AFF4 images.
c-aff4 Description
The Advanced Forensics File Format 4 (AFF4) is an open source format used for the storage of digital evidence and data. This project implements a C/C++ library for creating, reading and manipulating AFF4 images, and includes the canonical aff4imager binary which provides a general purpose standalone imaging tool. The library and binary are known to work on Linux, Windows, and OSX. It supports reading and writing ZipFile style volumes, Directory style volumes, and AFF4 Image streams using deflate or snappy compressor. It also supports multi-threaded imaging for efficient utilization on multi-core systems. However, it does not currently implement Section 6. Hashing of the standard, including verifying or generating linear or block hashes.
c-aff4 FAQ
Common questions about c-aff4 including features, pricing, alternatives, and user reviews.
c-aff4 is An open source format for storing digital evidence and data, with a C/C++ library for creating, reading, and manipulating AFF4 images.. It is a Security Operations solution designed to help security teams with Digital Forensics, Digital Evidence, Forensic Tool.
FEATURED
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
Fractional CISO services for B2B companies to build security programs
Stay Updated with Mandos Brief
Get the latest cybersecurity updates in your inbox
TRENDING CATEGORIES
POPULAR
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
Real-time OSINT monitoring for leaked credentials, data, and infrastructure