Ir RescueA Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.
Stars: ✭ 311 (-49.76%)
DfirtrackDFIRTrack - The Incident Response Tracking Application
Stars: ✭ 232 (-62.52%)
IntelmqIntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.
Stars: ✭ 611 (-1.29%)
ScriptingPS / Bash / Python / Other scripts For FUN!
Stars: ✭ 47 (-92.41%)
PypowershellxrayPython script to decode common encoded PowerShell scripts
Stars: ✭ 192 (-68.98%)
PockintA portable OSINT Swiss Army Knife for DFIR/OSINT professionals 🕵️ 🕵️ 🕵️
Stars: ✭ 196 (-68.34%)
PSTraceTrace ScriptBlock execution for powershell v2
Stars: ✭ 38 (-93.86%)
INDXRipperCarve file metadata from NTFS index ($I30) attributes
Stars: ✭ 32 (-94.83%)
MemProcFS-AnalyzerMemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR
Stars: ✭ 89 (-85.62%)
FameFAME Automates Malware Evaluation
Stars: ✭ 663 (+7.11%)
Misp TaxonomiesTaxonomies used in MISP taxonomy system and can be used by other information sharing tool.
Stars: ✭ 168 (-72.86%)
HistoricprocesstreeAn Incident Response tool that visualizes historic process execution evidence (based on Event ID 4688 - Process Creation Event) in a tree view.
Stars: ✭ 46 (-92.57%)
Cortex4pyPython API Client for Cortex
Stars: ✭ 22 (-96.45%)
OrianaOriana is a threat hunting tool that leverages a subset of Windows events to build relationships, calculate totals and run analytics. The results are presented in a Web layer to help defenders identify outliers and suspicious behavior on corporate environments.
Stars: ✭ 152 (-75.44%)
ThehiveTheHive: a Scalable, Open Source and Free Security Incident Response Platform
Stars: ✭ 2,300 (+271.57%)
Vast🔮 Visibility Across Space and Time
Stars: ✭ 227 (-63.33%)
ThreathuntThreatHunt is a PowerShell repository that allows you to train your threat hunting skills.
Stars: ✭ 92 (-85.14%)
ThePhishThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (+9.21%)
MEATThis toolkit aims to help forensicators perform different kinds of acquisitions on iOS devices
Stars: ✭ 101 (-83.68%)
Docker-TemplatesDocker configurations for TheHive, Cortex and 3rd party tools
Stars: ✭ 71 (-88.53%)
MindMaps#ThreatHunting #DFIR #Malware #Detection Mind Maps
Stars: ✭ 224 (-63.81%)
YobiYara Based Detection Engine for web browsers
Stars: ✭ 39 (-93.7%)
rhqRecon Hunt Queries
Stars: ✭ 66 (-89.34%)
KuiperDigital Forensics Investigation Platform
Stars: ✭ 257 (-58.48%)
catalystCatalyst is an open source SOAR system that helps to automate alert handling and incident response processes
Stars: ✭ 91 (-85.3%)
ThreatpinchlookupDocumentation and Sharing Repository for ThreatPinch Lookup Chrome & Firefox Extension
Stars: ✭ 257 (-58.48%)
CortexCortex: a Powerful Observable Analysis and Active Response Engine
Stars: ✭ 676 (+9.21%)
ir scriptsincident response scripts
Stars: ✭ 17 (-97.25%)
MalcomMalcom - Malware Communications Analyzer
Stars: ✭ 988 (+59.61%)
BeagleBeagle is an incident response and digital forensics tool which transforms security logs and data into graphs.
Stars: ✭ 976 (+57.67%)
MaliceVirusTotal Wanna Be - Now with 100% more Hipster
Stars: ✭ 1,253 (+102.42%)
fastfinderIncident Response - Fast suspicious file finder
Stars: ✭ 116 (-81.26%)
Thehive4pyPython API Client for TheHive
Stars: ✭ 143 (-76.9%)
MthcAll-in-one bundle of MISP, TheHive and Cortex
Stars: ✭ 134 (-78.35%)
Imago ForensicsImago is a python tool that extract digital evidences from images.
Stars: ✭ 175 (-71.73%)
Atc ReactA knowledge base of actionable Incident Response techniques
Stars: ✭ 226 (-63.49%)
Dfir OrcForensics artefact collection tool for systems running Microsoft Windows
Stars: ✭ 202 (-67.37%)
FclFCL (Fileless Command Lines) - Known command lines of fileless malicious executions
Stars: ✭ 409 (-33.93%)
CCXDiggerThe CyberCX Digger project is designed to help Australian organisations determine if they have been impacted by certain high profile cyber security incidents. Digger provides threat hunting functionality packaged in a simple-to-use tool, allowing users to detect certain attacker activities; all for free.
Stars: ✭ 45 (-92.73%)
RdpCacheStitcherRdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps.
Stars: ✭ 176 (-71.57%)
pyarascannerA simple many-rules to many-files YARA scanner for incident response or malware zoos.
Stars: ✭ 23 (-96.28%)
PackratLive system forensic collector
Stars: ✭ 16 (-97.42%)
uacUAC is a Live Response collection script for Incident Response that makes use of native binaries and tools to automate the collection of AIX, Android, ESXi, FreeBSD, Linux, macOS, NetBSD, NetScaler, OpenBSD and Solaris systems artifacts.
Stars: ✭ 260 (-58%)
CDIRCDIR (Cyber Defense Institute Incident Response) Collector - live collection tool based on oss tool/library
Stars: ✭ 122 (-80.29%)
EvilizeParses Windows event logs files based on SANS Poster
Stars: ✭ 24 (-96.12%)
UrlextractorInformation gathering & website reconnaissance | https://phishstats.info/
Stars: ✭ 341 (-44.91%)
ThehivedocsDocumentation of TheHive
Stars: ✭ 353 (-42.97%)
TurbiniaAutomation and Scaling of Digital Forensics Tools
Stars: ✭ 461 (-25.53%)
CyphonOpen source incident management and response platform.
Stars: ✭ 543 (-12.28%)
WdbgarkWinDBG Anti-RootKit Extension
Stars: ✭ 450 (-27.3%)
Box JsA tool for studying JavaScript malware.
Stars: ✭ 444 (-28.27%)
DemosDemos of various injection techniques found in malware
Stars: ✭ 582 (-5.98%)
OpcdeOPCDE Cybersecurity Conference Materials
Stars: ✭ 538 (-13.09%)
MorphhtamorphHTA - Morphing Cobalt Strike's evil.HTA
Stars: ✭ 438 (-29.24%)