Forensic ToolsCIRCL system forensic tools or a jumble of tools to support forensic
Stars: ✭ 27 (-80.71%)
INDXRipperCarve file metadata from NTFS index ($I30) attributes
Stars: ✭ 32 (-77.14%)
ThehiveTheHive: a Scalable, Open Source and Free Security Incident Response Platform
Stars: ✭ 2,300 (+1542.86%)
CortexCortex: a Powerful Observable Analysis and Active Response Engine
Stars: ✭ 676 (+382.86%)
ThehivedocsDocumentation of TheHive
Stars: ✭ 353 (+152.14%)
Thehive4pyPython API Client for TheHive
Stars: ✭ 143 (+2.14%)
Artifacts📇 Digital Forensics Artifact Repository (forensicanalysis edition)
Stars: ✭ 21 (-85%)
DfirtrackDFIRTrack - The Incident Response Tracking Application
Stars: ✭ 232 (+65.71%)
KuiperDigital Forensics Investigation Platform
Stars: ✭ 257 (+83.57%)
BeagleBeagle is an incident response and digital forensics tool which transforms security logs and data into graphs.
Stars: ✭ 976 (+597.14%)
LinuxforensicsEverything related to Linux Forensics
Stars: ✭ 189 (+35%)
Awesome ForensicsA curated list of awesome forensic analysis tools and resources
Stars: ✭ 1,775 (+1167.86%)
MemlabsEducational, CTF-styled labs for individuals interested in Memory Forensics
Stars: ✭ 696 (+397.14%)
catalystCatalyst is an open source SOAR system that helps to automate alert handling and incident response processes
Stars: ✭ 91 (-35%)
MemProcFS-AnalyzerMemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR
Stars: ✭ 89 (-36.43%)
Blue-Team-NotesYou didn't think I'd go and leave the blue team out, right?
Stars: ✭ 899 (+542.14%)
EvilizeParses Windows event logs files based on SANS Poster
Stars: ✭ 24 (-82.86%)
MEATThis toolkit aims to help forensicators perform different kinds of acquisitions on iOS devices
Stars: ✭ 101 (-27.86%)
GetConsoleHistoryAndOutputAn Incident Response tool to extract console command history and screen output buffer
Stars: ✭ 41 (-70.71%)
smram parseSystem Management RAM analysis tool
Stars: ✭ 50 (-64.29%)
DFIR-O365RCPowerShell module for Office 365 and Azure log collection
Stars: ✭ 158 (+12.86%)
BlueCloudCyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.
Stars: ✭ 88 (-37.14%)
TA-Sysmon-deployDeploy and maintain Symon through the Splunk Deployment Sever
Stars: ✭ 31 (-77.86%)
ad-privileged-auditProvides various Windows Server Active Directory (AD) security-focused reports.
Stars: ✭ 42 (-70%)
teleparserTelegram cache4.db parser
Stars: ✭ 52 (-62.86%)
SuperLibraryInformation Security Library
Stars: ✭ 60 (-57.14%)
hayabusaHayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Stars: ✭ 908 (+548.57%)
yara-validatorValidates yara rules and tries to repair the broken ones.
Stars: ✭ 37 (-73.57%)
ThePhishThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (+382.86%)
PSTraceTrace ScriptBlock execution for powershell v2
Stars: ✭ 38 (-72.86%)
RdpCacheStitcherRdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps.
Stars: ✭ 176 (+25.71%)
pyaff4The Python implementation of the AFF4 standard.
Stars: ✭ 37 (-73.57%)
zeek-docsDocumentation for Zeek
Stars: ✭ 41 (-70.71%)
Docker-TemplatesDocker configurations for TheHive, Cortex and 3rd party tools
Stars: ✭ 71 (-49.29%)
TheHiveHooksThis is a python tool aiming to make using TheHive webhooks easier.
Stars: ✭ 22 (-84.29%)
pftriagePython tool and library to help analyze files during malware triage and analysis.
Stars: ✭ 77 (-45%)
pyarascannerA simple many-rules to many-files YARA scanner for incident response or malware zoos.
Stars: ✭ 23 (-83.57%)
PackratLive system forensic collector
Stars: ✭ 16 (-88.57%)
EventTranscript.db-ResearchA repo for centralizing ongoing research on the new Windows 10/11 DFIR artifact, EventTranscript.db.
Stars: ✭ 33 (-76.43%)
calamityA script to assist in processing forensic RAM captures for malware triage
Stars: ✭ 24 (-82.86%)
LevelDBDumperDumps all of the Key/Value pairs from a LevelDB database
Stars: ✭ 23 (-83.57%)
WELAWELA (Windows Event Log Analyzer): The Swiss Army knife for Windows Event Logs! ゑ羅(ウェラ)
Stars: ✭ 442 (+215.71%)
uacUAC is a Live Response collection script for Incident Response that makes use of native binaries and tools to automate the collection of AIX, Android, ESXi, FreeBSD, Linux, macOS, NetBSD, NetScaler, OpenBSD and Solaris systems artifacts.
Stars: ✭ 260 (+85.71%)
CCXDiggerThe CyberCX Digger project is designed to help Australian organisations determine if they have been impacted by certain high profile cyber security incidents. Digger provides threat hunting functionality packaged in a simple-to-use tool, allowing users to detect certain attacker activities; all for free.
Stars: ✭ 45 (-67.86%)
AdtimelineTimeline of Active Directory changes with replication metadata
Stars: ✭ 252 (+80%)
DetectionlabAutomate the creation of a lab environment complete with security tooling and logging best practices
Stars: ✭ 3,237 (+2212.14%)
DDTTXDDTTX Tabletop Trainings
Stars: ✭ 22 (-84.29%)
CDIRCDIR (Cyber Defense Institute Incident Response) Collector - live collection tool based on oss tool/library
Stars: ✭ 122 (-12.86%)
Vast🔮 Visibility Across Space and Time
Stars: ✭ 227 (+62.14%)
AUCRAnalyst Unknown Cyber Range - a micro web service framework
Stars: ✭ 24 (-82.86%)
Threathunter PlaybookA Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.
Stars: ✭ 2,879 (+1956.43%)
Atc ReactA knowledge base of actionable Incident Response techniques
Stars: ✭ 226 (+61.43%)
ForensicsToolsA list of free and open forensics analysis tools and other resources
Stars: ✭ 392 (+180%)
EventTranscriptParserPython based tool to extract forensic info from EventTranscript.db (Windows Diagnostic Data)
Stars: ✭ 22 (-84.29%)
Splunk-ETWA Splunk Technology Add-on to forward filtered ETW events.
Stars: ✭ 26 (-81.43%)
UserlineQuery and report user logons relations from MS Windows Security Events
Stars: ✭ 221 (+57.86%)