WELAWELA (Windows Event Log Analyzer): The Swiss Army knife for Windows Event Logs! ゑ羅(ウェラ)
Stars: ✭ 442 (-51.32%)
MindMaps#ThreatHunting #DFIR #Malware #Detection Mind Maps
Stars: ✭ 224 (-75.33%)
MeerkatA collection of PowerShell modules designed for artifact gathering and reconnaisance of Windows-based endpoints.
Stars: ✭ 284 (-68.72%)
SiemSIEM Tactics, Techiques, and Procedures
Stars: ✭ 157 (-82.71%)
SWELFSimple Windows Event Log Forwarder (SWELF). Its easy to use/simply works Log Forwarder and EVTX Parser. Almost in full release here at https://github.com/ceramicskate0/SWELF/releases/latest.
Stars: ✭ 23 (-97.47%)
CDIRCDIR (Cyber Defense Institute Incident Response) Collector - live collection tool based on oss tool/library
Stars: ✭ 122 (-86.56%)
DFIR-O365RCPowerShell module for Office 365 and Azure log collection
Stars: ✭ 158 (-82.6%)
EventTranscriptParserPython based tool to extract forensic info from EventTranscript.db (Windows Diagnostic Data)
Stars: ✭ 22 (-97.58%)
Mac aptmacOS Artifact Parsing Tool
Stars: ✭ 329 (-63.77%)
Swap digger swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searches for Linux user credentials, web forms credentials, web forms emails, http basic authentication, Wifi SSID and keys, etc.
Stars: ✭ 354 (-61.01%)
MemlabsEducational, CTF-styled labs for individuals interested in Memory Forensics
Stars: ✭ 696 (-23.35%)
Etl ParserEvent Trace Log file parser in pure Python
Stars: ✭ 66 (-92.73%)
INDXRipperCarve file metadata from NTFS index ($I30) attributes
Stars: ✭ 32 (-96.48%)
dnslogMinimalistic DNS logging tool
Stars: ✭ 40 (-95.59%)
ad-privileged-auditProvides various Windows Server Active Directory (AD) security-focused reports.
Stars: ✭ 42 (-95.37%)
uacUAC is a Live Response collection script for Incident Response that makes use of native binaries and tools to automate the collection of AIX, Android, ESXi, FreeBSD, Linux, macOS, NetBSD, NetScaler, OpenBSD and Solaris systems artifacts.
Stars: ✭ 260 (-71.37%)
RecuperabitA tool for forensic file system reconstruction.
Stars: ✭ 280 (-69.16%)
Ir RescueA Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.
Stars: ✭ 311 (-65.75%)
HindsightWeb browser forensics for Google Chrome/Chromium
Stars: ✭ 589 (-35.13%)
smram parseSystem Management RAM analysis tool
Stars: ✭ 50 (-94.49%)
AdtimelineTimeline of Active Directory changes with replication metadata
Stars: ✭ 252 (-72.25%)
LinuxforensicsEverything related to Linux Forensics
Stars: ✭ 189 (-79.19%)
winevtWindows Event Interactions in Python
Stars: ✭ 59 (-93.5%)
MEATThis toolkit aims to help forensicators perform different kinds of acquisitions on iOS devices
Stars: ✭ 101 (-88.88%)
TimesketchCollaborative forensic timeline analysis
Stars: ✭ 1,795 (+97.69%)
TelerReal-time HTTP Intrusion Detection
Stars: ✭ 1,248 (+37.44%)
RitaReal Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis.
Stars: ✭ 1,352 (+48.9%)
Threathunter PlaybookA Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.
Stars: ✭ 2,879 (+217.07%)
CortexCortex: a Powerful Observable Analysis and Active Response Engine
Stars: ✭ 676 (-25.55%)
ThePhishThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (-25.55%)
Security OnionSecurity Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management
Stars: ✭ 2,956 (+225.55%)
GetConsoleHistoryAndOutputAn Incident Response tool to extract console command history and screen output buffer
Stars: ✭ 41 (-95.48%)
PSTraceTrace ScriptBlock execution for powershell v2
Stars: ✭ 38 (-95.81%)
Opensource-Endpoint-MonitoringThis repository contains all the config files and scripts used for our Open Source Endpoint monitoring project.
Stars: ✭ 30 (-96.7%)
ir scriptsincident response scripts
Stars: ✭ 17 (-98.13%)
RdpCacheStitcherRdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps.
Stars: ✭ 176 (-80.62%)
LevelDBDumperDumps all of the Key/Value pairs from a LevelDB database
Stars: ✭ 23 (-97.47%)
DiffyDiffy is a triage tool used during cloud-centric security incidents, to help digital forensics and incident response (DFIR) teams quickly identify suspicious hosts on which to focus their response.
Stars: ✭ 555 (-38.88%)
TurbiniaAutomation and Scaling of Digital Forensics Tools
Stars: ✭ 461 (-49.23%)
AutotimelinerAutomagically extract forensic timeline from volatile memory dump
Stars: ✭ 54 (-94.05%)
ManTraNet-pytorchImplementation of the famous Image Manipulation\Forgery Detector "ManTraNet" in Pytorch
Stars: ✭ 47 (-94.82%)
UserlineQuery and report user logons relations from MS Windows Security Events
Stars: ✭ 221 (-75.66%)
PypowershellxrayPython script to decode common encoded PowerShell scripts
Stars: ✭ 192 (-78.85%)
hepipe.jsPipe arbitrary data rows (logs, events, cdrs, esl, etc) to HEP Server (HOMER)
Stars: ✭ 22 (-97.58%)
PoShLog🔩 PoShLog is PowerShell cross-platform logging module. It allows you to log structured event data into console, file and much more places easily. It's built upon great C# logging library Serilog - https://serilog.net/
Stars: ✭ 108 (-88.11%)
DetectionlabAutomate the creation of a lab environment complete with security tooling and logging best practices
Stars: ✭ 3,237 (+256.5%)
CCXDiggerThe CyberCX Digger project is designed to help Australian organisations determine if they have been impacted by certain high profile cyber security incidents. Digger provides threat hunting functionality packaged in a simple-to-use tool, allowing users to detect certain attacker activities; all for free.
Stars: ✭ 45 (-95.04%)
ScriptingPS / Bash / Python / Other scripts For FUN!
Stars: ✭ 47 (-94.82%)
SIGMA-ResourcesResources To Learn And Understand SIGMA Rules
Stars: ✭ 61 (-93.28%)
AutomataAutomatic detection engineering technical state compliance
Stars: ✭ 33 (-96.37%)
PackratLive system forensic collector
Stars: ✭ 16 (-98.24%)
ZircoliteA standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs
Stars: ✭ 443 (-51.21%)
deautherAn interactive command-line deauther for macOS.
Stars: ✭ 70 (-92.29%)
harvestTool to sort large collections of files according to common typologies
Stars: ✭ 32 (-96.48%)
ChordlyChordly is a javascript library that may be used to detect and act upon key sequences entered by a user.
Stars: ✭ 14 (-98.46%)