Add SQLite table to JSONL export tool
This commit is contained in:
@@ -70,6 +70,7 @@ Format: `path | goal | usage`. This section is intentionally compact so `what` c
|
||||
|
||||
- `tools/forensics/chechsqlite.py` | goal: inspect SQLite databases for password or hash style columns | usage: `python3 tools/forensics/chechsqlite.py sample.db`
|
||||
- `tools/forensics/extractfolder.py` | goal: bulk-extract or sort files from a folder workflow | usage: `python3 tools/forensics/extractfolder.py input_dir`
|
||||
- `tools/forensics/sqlite32jsonl.py` | goal: export each user table from a SQLite database to one JSONL file with robust filename handling | usage: `python3 tools/forensics/sqlite32jsonl.py sample.db -o outdir`
|
||||
- `tools/forensics/process_leak.py` | goal: inspect process-leak style artifacts | usage: `python3 tools/forensics/process_leak.py artifact`
|
||||
- `tools/forensics/mailunpack` | goal: extract mail attachments inside a constrained container workflow | usage: `tools/forensics/mailunpack message.eml`
|
||||
- `tools/forensics/showgm.sh` | goal: open image GPS EXIF coordinates in Google Maps | usage: `tools/forensics/showgm.sh image.jpg`
|
||||
@@ -218,6 +219,7 @@ Format: `path | goal | usage`. This section is intentionally compact so `what` c
|
||||
|
||||
- `tools/forensics/chechsqlite.py`: inspects SQLite databases for password/hash-like fields and consistency issues.
|
||||
- `tools/forensics/extractfolder.py`: folder extraction/helper script for bulk processing.
|
||||
- `tools/forensics/sqlite32jsonl.py`: exports each user table in a SQLite database to a separate JSONL file with argparse help and logging.
|
||||
- `tools/forensics/mailunpack`: containerized `munpack` wrapper for extracting mail attachments safely.
|
||||
- `tools/forensics/process_leak.py`: process-memory or artifact triage helper.
|
||||
- `tools/forensics/showgm.sh`, `showosm.sh`: extract GPS EXIF data from images and open the location in Google Maps or OpenStreetMap.
|
||||
|
||||
Reference in New Issue
Block a user