LfLe Logo

LfLe

0
Free
Updated 11 March 2025
Visit Website

Recover event log entries from an image by heuristically looking for record structures. Dependencies: argparse (http://pypi.python.org/pypi/argparse available via easy_install/pip). Usage: Use this tool to extract event log messages from an image file by looking for things that appear to be records. Then, feed the resulting file into an event log viewer, such as Event Log Explorer (http://www.eventlogxp.com/, use 'direct' mode when opening). Sample Output: evt/LfLe - [master●] » python lfle.py '/media/truecrypt2/VM/Windows XP Professional - Service Pack 3 - TEMPLATE/Windows XP Professional - Service Pack 3-cl1.vmdk' recovered.evt 100% complete% done. Wrote 5413 records. Skipped 48 records with length greater than 0x10000. Skipped 12.

FEATURES

SIMILAR TOOLS

Forensic imaging program with full hash authentication and various acquisition options.

Developing APIs to access memory on industrial control system devices.

An anti-forensic Linux Kernel Module kill-switch for USB ports.

A library to access and read QEMU Copy-On-Write (QCOW) image file formats with support for zlib compression and AES-CBC encryption.

A library for working with Windows NT data types, providing access and manipulation functions.

Highlighter is a FireEye Market app that integrates with FireEye products to provide enhanced cybersecurity capabilities.

A python module for orchestrating content acquisitions and analysis via Amazon SSM.

Windows event log fast forensics timeline generator and threat hunting tool.

MFT and USN parser for direct extraction in filesystem timeline format with YARA rule support.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved