All Projects → forensicanalysis → artifactcollector

forensicanalysis / artifactcollector

Licence: MIT license
🚨 The artifactcollector is a customizable agent to collect forensic artifacts on any Windows, macOS or Linux system

Programming Languages

go
31211 projects - #10 most used programming language
shell
77523 projects
Dockerfile
14818 projects

Projects that are alternatives of or similar to artifactcollector

Artifacts
📇 Digital Forensics Artifact Repository (forensicanalysis edition)
Stars: ✭ 21 (-85%)
Mutual labels:  dfir, digital-forensics
Thehive4py
Python API Client for TheHive
Stars: ✭ 143 (+2.14%)
Mutual labels:  dfir, digital-forensics
Forensic Tools
CIRCL system forensic tools or a jumble of tools to support forensic
Stars: ✭ 27 (-80.71%)
Mutual labels:  dfir, digital-forensics
Thehivedocs
Documentation of TheHive
Stars: ✭ 353 (+152.14%)
Mutual labels:  dfir, digital-forensics
Cortex Analyzers
Cortex Analyzers Repository
Stars: ✭ 246 (+75.71%)
Mutual labels:  dfir, digital-forensics
Memlabs
Educational, CTF-styled labs for individuals interested in Memory Forensics
Stars: ✭ 696 (+397.14%)
Mutual labels:  dfir, digital-forensics
Awesome Forensics
A curated list of awesome forensic analysis tools and resources
Stars: ✭ 1,775 (+1167.86%)
Mutual labels:  dfir, digital-forensics
Cortex
Cortex: a Powerful Observable Analysis and Active Response Engine
Stars: ✭ 676 (+382.86%)
Mutual labels:  dfir, digital-forensics
Dfirtrack
DFIRTrack - The Incident Response Tracking Application
Stars: ✭ 232 (+65.71%)
Mutual labels:  dfir, digital-forensics
Linuxforensics
Everything related to Linux Forensics
Stars: ✭ 189 (+35%)
Mutual labels:  dfir, digital-forensics
Kuiper
Digital Forensics Investigation Platform
Stars: ✭ 257 (+83.57%)
Mutual labels:  dfir, digital-forensics
catalyst
Catalyst is an open source SOAR system that helps to automate alert handling and incident response processes
Stars: ✭ 91 (-35%)
Mutual labels:  dfir, digital-forensics
Beagle
Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.
Stars: ✭ 976 (+597.14%)
Mutual labels:  dfir, digital-forensics
Thehive
TheHive: a Scalable, Open Source and Free Security Incident Response Platform
Stars: ✭ 2,300 (+1542.86%)
Mutual labels:  dfir, digital-forensics
INDXRipper
Carve file metadata from NTFS index ($I30) attributes
Stars: ✭ 32 (-77.14%)
Mutual labels:  dfir, digital-forensics
MemProcFS-Analyzer
MemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR
Stars: ✭ 89 (-36.43%)
Mutual labels:  dfir, digital-forensics
osint to timesketch
Virustotal Data to Timesketch
Stars: ✭ 15 (-89.29%)
Mutual labels:  dfir
yara-validator
Validates yara rules and tries to repair the broken ones.
Stars: ✭ 37 (-73.57%)
Mutual labels:  dfir
Evilize
Parses Windows event logs files based on SANS Poster
Stars: ✭ 24 (-82.86%)
Mutual labels:  dfir
PSTrace
Trace ScriptBlock execution for powershell v2
Stars: ✭ 38 (-72.86%)
Mutual labels:  dfir

artifactcollector

doc

The artifactcollector project provides a software that collects forensic artifacts on systems. These artifacts can be used in forensic investigations to understand attacker behavior on compromised computers.

Features

The artifactcollector offers the following features

  • 🖥️ Runs on 🖼️ Windows, 🐧 Linux and 🍏 macOS
  • 🛍️ Can extract files, directories, registry entries, command and WMI output
  • Uses the configurable and extensible Forensics Artifacts
  • 💾 Creates a forensicstore as structured output
  • 🕊️ It's open source
  • 🆓 Free for everyone (including commercial use)

Installation

Download from https://github.com/forensicanalysis/artifactcollector/releases or

git clone https://github.com/forensicanalysis/artifactcollector
cd artifactcollector
go install .

Get artifacts & process forensicstores

If you want to extract the raw artifacts or process the collected data have a look at

🕵️ elementary

Build your own artifactcollector

  1. Clone the repository: git clone https://github.com/forensicanalysis/artifactcollector.
  2. Run go generate to download all artifacts.
  3. Add artifact definition yaml files as needed in pack/artifacts. Do not edit the artifact definitions, as they will be overwritten.
  4. Edit pack/ac.yaml and add the artifacts you want to collect.
  5. Run go generate. This might yield some errors or problems in your artifacts.
  6. On windows you can move the syso into the root folder (e.g. cp resources\artifactcollector.syso .) to enable the icon for the executable and the UAC popup.
  7. Run go build . to generates an executable.

Embed binaries

Binaries can be added to pack/bin and than included into the artifactcollector in the go generate step. Additionally a corresponding COMMAND artifact like the following is required.

name: Autoruns
sources:
- type: COMMAND
  attributes:
    cmd: autorunsc.exe
    args: ["-x"]
supported_os: [Windows]

Currently the output to stdout and stderr is saved, but generated files are not collected.

Cross compilation

Cross compilation is a bit more difficult, as a cross compiler like MinGW is required by CGO.

Example cross compilation for Windows:

CGO_ENABLED=1 CC=i686-w64-mingw32-gcc GOOS=windows GOARCH=386 go build .
CGO_ENABLED=1 CC=x86_64-w64-mingw32-gcc GOOS=windows GOARCH=amd64 go build .

Limitations

  • Currently only files that are smaller than 1GB when compressed can be collected. This can be circumvented by using a zip archive for artifact collection.

Contact

For feedback, questions and discussions you can use the Open Source DFIR Slack.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].