INDXRipperCarve file metadata from NTFS index ($I30) attributes
Stars: ✭ 32 (-64.04%)
catalystCatalyst is an open source SOAR system that helps to automate alert handling and incident response processes
Stars: ✭ 91 (+2.25%)
Thehive4pyPython API Client for TheHive
Stars: ✭ 143 (+60.67%)
KuiperDigital Forensics Investigation Platform
Stars: ✭ 257 (+188.76%)
uacUAC is a Live Response collection script for Incident Response that makes use of native binaries and tools to automate the collection of AIX, Android, ESXi, FreeBSD, Linux, macOS, NetBSD, NetScaler, OpenBSD and Solaris systems artifacts.
Stars: ✭ 260 (+192.13%)
ThehivedocsDocumentation of TheHive
Stars: ✭ 353 (+296.63%)
CortexCortex: a Powerful Observable Analysis and Active Response Engine
Stars: ✭ 676 (+659.55%)
ThehiveTheHive: a Scalable, Open Source and Free Security Incident Response Platform
Stars: ✭ 2,300 (+2484.27%)
BeagleBeagle is an incident response and digital forensics tool which transforms security logs and data into graphs.
Stars: ✭ 976 (+996.63%)
DfirtrackDFIRTrack - The Incident Response Tracking Application
Stars: ✭ 232 (+160.67%)
calamityA script to assist in processing forensic RAM captures for malware triage
Stars: ✭ 24 (-73.03%)
MthcAll-in-one bundle of MISP, TheHive and Cortex
Stars: ✭ 134 (+50.56%)
MemlabsEducational, CTF-styled labs for individuals interested in Memory Forensics
Stars: ✭ 696 (+682.02%)
MindMaps#ThreatHunting #DFIR #Malware #Detection Mind Maps
Stars: ✭ 224 (+151.69%)
Artifacts📇 Digital Forensics Artifact Repository (forensicanalysis edition)
Stars: ✭ 21 (-76.4%)
LinuxforensicsEverything related to Linux Forensics
Stars: ✭ 189 (+112.36%)
pyarascannerA simple many-rules to many-files YARA scanner for incident response or malware zoos.
Stars: ✭ 23 (-74.16%)
fastfinderIncident Response - Fast suspicious file finder
Stars: ✭ 116 (+30.34%)
rhqRecon Hunt Queries
Stars: ✭ 66 (-25.84%)
CCXDiggerThe CyberCX Digger project is designed to help Australian organisations determine if they have been impacted by certain high profile cyber security incidents. Digger provides threat hunting functionality packaged in a simple-to-use tool, allowing users to detect certain attacker activities; all for free.
Stars: ✭ 45 (-49.44%)
Ir RescueA Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.
Stars: ✭ 311 (+249.44%)
ThreatpinchlookupDocumentation and Sharing Repository for ThreatPinch Lookup Chrome & Firefox Extension
Stars: ✭ 257 (+188.76%)
EvilizeParses Windows event logs files based on SANS Poster
Stars: ✭ 24 (-73.03%)
Vast🔮 Visibility Across Space and Time
Stars: ✭ 227 (+155.06%)
Cortex4pyPython API Client for Cortex
Stars: ✭ 22 (-75.28%)
CDIRCDIR (Cyber Defense Institute Incident Response) Collector - live collection tool based on oss tool/library
Stars: ✭ 122 (+37.08%)
artifactcollector🚨 The artifactcollector is a customizable agent to collect forensic artifacts on any Windows, macOS or Linux system
Stars: ✭ 140 (+57.3%)
PypowershellxrayPython script to decode common encoded PowerShell scripts
Stars: ✭ 192 (+115.73%)
Awesome ForensicsA curated list of awesome forensic analysis tools and resources
Stars: ✭ 1,775 (+1894.38%)
Forensic ToolsCIRCL system forensic tools or a jumble of tools to support forensic
Stars: ✭ 27 (-69.66%)
ThreathuntThreatHunt is a PowerShell repository that allows you to train your threat hunting skills.
Stars: ✭ 92 (+3.37%)
Dfir OrcForensics artefact collection tool for systems running Microsoft Windows
Stars: ✭ 202 (+126.97%)
Docker-TemplatesDocker configurations for TheHive, Cortex and 3rd party tools
Stars: ✭ 71 (-20.22%)
PockintA portable OSINT Swiss Army Knife for DFIR/OSINT professionals 🕵️ 🕵️ 🕵️
Stars: ✭ 196 (+120.22%)
PackratLive system forensic collector
Stars: ✭ 16 (-82.02%)
CASECyber-investigation Analysis Standard Expression (CASE) Ontology
Stars: ✭ 46 (-48.31%)
ir scriptsincident response scripts
Stars: ✭ 17 (-80.9%)
MEATThis toolkit aims to help forensicators perform different kinds of acquisitions on iOS devices
Stars: ✭ 101 (+13.48%)
OrianaOriana is a threat hunting tool that leverages a subset of Windows events to build relationships, calculate totals and run analytics. The results are presented in a Web layer to help defenders identify outliers and suspicious behavior on corporate environments.
Stars: ✭ 152 (+70.79%)
ThePhishThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (+659.55%)
PSTraceTrace ScriptBlock execution for powershell v2
Stars: ✭ 38 (-57.3%)
Atc ReactA knowledge base of actionable Incident Response techniques
Stars: ✭ 226 (+153.93%)
ScriptingPS / Bash / Python / Other scripts For FUN!
Stars: ✭ 47 (-47.19%)
HistoricprocesstreeAn Incident Response tool that visualizes historic process execution evidence (based on Event ID 4688 - Process Creation Event) in a tree view.
Stars: ✭ 46 (-48.31%)
Cyberchef RecipesA list of cyber-chef recipes and curated links
Stars: ✭ 619 (+595.51%)
Imago ForensicsImago is a python tool that extract digital evidences from images.
Stars: ✭ 175 (+96.63%)
RdpCacheStitcherRdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps.
Stars: ✭ 176 (+97.75%)
BlueCloudCyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.
Stars: ✭ 88 (-1.12%)
zeek-docsDocumentation for Zeek
Stars: ✭ 41 (-53.93%)
macOS-irPrototype to collect data and analyse it from a compromised macOS device.
Stars: ✭ 16 (-82.02%)
PowerGRRPowerGRR is an API client library in PowerShell working on Windows, Linux and macOS for GRR automation and scripting.
Stars: ✭ 52 (-41.57%)
TA-Sysmon-deployDeploy and maintain Symon through the Splunk Deployment Sever
Stars: ✭ 31 (-65.17%)
TheHiveHooksThis is a python tool aiming to make using TheHive webhooks easier.
Stars: ✭ 22 (-75.28%)