MEATThis toolkit aims to help forensicators perform different kinds of acquisitions on iOS devices
Stars: ✭ 101 (-36.08%)
PypowershellxrayPython script to decode common encoded PowerShell scripts
Stars: ✭ 192 (+21.52%)
Etl ParserEvent Trace Log file parser in pure Python
Stars: ✭ 66 (-58.23%)
HindsightWeb browser forensics for Google Chrome/Chromium
Stars: ✭ 589 (+272.78%)
ir scriptsincident response scripts
Stars: ✭ 17 (-89.24%)
MindMaps#ThreatHunting #DFIR #Malware #Detection Mind Maps
Stars: ✭ 224 (+41.77%)
TurbiniaAutomation and Scaling of Digital Forensics Tools
Stars: ✭ 461 (+191.77%)
CDIRCDIR (Cyber Defense Institute Incident Response) Collector - live collection tool based on oss tool/library
Stars: ✭ 122 (-22.78%)
UserlineQuery and report user logons relations from MS Windows Security Events
Stars: ✭ 221 (+39.87%)
RdpCacheStitcherRdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps.
Stars: ✭ 176 (+11.39%)
WELAWELA (Windows Event Log Analyzer): The Swiss Army knife for Windows Event Logs! ゑ羅(ウェラ)
Stars: ✭ 442 (+179.75%)
AutotimelinerAutomagically extract forensic timeline from volatile memory dump
Stars: ✭ 54 (-65.82%)
GetConsoleHistoryAndOutputAn Incident Response tool to extract console command history and screen output buffer
Stars: ✭ 41 (-74.05%)
PSTraceTrace ScriptBlock execution for powershell v2
Stars: ✭ 38 (-75.95%)
dnslogMinimalistic DNS logging tool
Stars: ✭ 40 (-74.68%)
DiffyDiffy is a triage tool used during cloud-centric security incidents, to help digital forensics and incident response (DFIR) teams quickly identify suspicious hosts on which to focus their response.
Stars: ✭ 555 (+251.27%)
INDXRipperCarve file metadata from NTFS index ($I30) attributes
Stars: ✭ 32 (-79.75%)
LevelDBDumperDumps all of the Key/Value pairs from a LevelDB database
Stars: ✭ 23 (-85.44%)
Swap digger swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searches for Linux user credentials, web forms credentials, web forms emails, http basic authentication, Wifi SSID and keys, etc.
Stars: ✭ 354 (+124.05%)
RecuperabitA tool for forensic file system reconstruction.
Stars: ✭ 280 (+77.22%)
TimesketchCollaborative forensic timeline analysis
Stars: ✭ 1,795 (+1036.08%)
LinuxforensicsEverything related to Linux Forensics
Stars: ✭ 189 (+19.62%)
Mac aptmacOS Artifact Parsing Tool
Stars: ✭ 329 (+108.23%)
CCXDiggerThe CyberCX Digger project is designed to help Australian organisations determine if they have been impacted by certain high profile cyber security incidents. Digger provides threat hunting functionality packaged in a simple-to-use tool, allowing users to detect certain attacker activities; all for free.
Stars: ✭ 45 (-71.52%)
uacUAC is a Live Response collection script for Incident Response that makes use of native binaries and tools to automate the collection of AIX, Android, ESXi, FreeBSD, Linux, macOS, NetBSD, NetScaler, OpenBSD and Solaris systems artifacts.
Stars: ✭ 260 (+64.56%)
hayabusaHayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Stars: ✭ 908 (+474.68%)
Ir RescueA Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.
Stars: ✭ 311 (+96.84%)
smram parseSystem Management RAM analysis tool
Stars: ✭ 50 (-68.35%)
EventTranscriptParserPython based tool to extract forensic info from EventTranscript.db (Windows Diagnostic Data)
Stars: ✭ 22 (-86.08%)
ad-privileged-auditProvides various Windows Server Active Directory (AD) security-focused reports.
Stars: ✭ 42 (-73.42%)
MemlabsEducational, CTF-styled labs for individuals interested in Memory Forensics
Stars: ✭ 696 (+340.51%)
AdtimelineTimeline of Active Directory changes with replication metadata
Stars: ✭ 252 (+59.49%)
PackratLive system forensic collector
Stars: ✭ 16 (-89.87%)
Blue-Team-NotesYou didn't think I'd go and leave the blue team out, right?
Stars: ✭ 899 (+468.99%)
Partner-Smart-OfficeAn open source toolkit empowering partners understand their customer’s security posture.
Stars: ✭ 37 (-76.58%)
RemoteNETExamine, create and interact with remote objects in other .NET processes.
Stars: ✭ 29 (-81.65%)
ms-rest-nodeauthnode.js based authentication library for Azure with type definitions
Stars: ✭ 31 (-80.38%)
AUCRAnalyst Unknown Cyber Range - a micro web service framework
Stars: ✭ 24 (-84.81%)
harvestTool to sort large collections of files according to common typologies
Stars: ✭ 32 (-79.75%)
exchange-ews-thunderbirdthunderbird addons provide exchange support: mail, calendar, global address list (contacts)
Stars: ✭ 15 (-90.51%)
Splunk-ETWA Splunk Technology Add-on to forward filtered ETW events.
Stars: ✭ 26 (-83.54%)
AppmemDumperForensics triage tool relying on Volatility and Foremost
Stars: ✭ 22 (-86.08%)
urlRecon📝 urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Server Fingerprint * IP geolocation of the server
Stars: ✭ 31 (-80.38%)
active-directory-androidAn android app that uses Azure AD and the ADAL library for authenticating the user and calling a web API using OAuth 2.0 access tokens.
Stars: ✭ 33 (-79.11%)
vbo365-restUnofficial Self-Service Web Portal for Veeam Backup for Microsoft Office 365
Stars: ✭ 44 (-72.15%)
vminspectTools for inspecting disk images
Stars: ✭ 25 (-84.18%)
BlockHashLocRecover files using lists of blocks hashes, bypassing the File System entirely
Stars: ✭ 45 (-71.52%)
BlueCloudCyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.
Stars: ✭ 88 (-44.3%)