3gbCyber / IR-Last-Write-TimeLinks
Simple Script to Help You Find All Files Has Been Modified, Accessed, and Created In A Range Time.
☆27Updated 2 years ago
Alternatives and similar repositories for IR-Last-Write-Time
Users that are interested in IR-Last-Write-Time are comparing it to the libraries listed below
Sorting:
- A series of PowerShell scripts to automate collection of forensic artefacts in most Incident Response environments☆65Updated 3 years ago
- ☆22Updated 2 years ago
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆11Updated 2 years ago
- Linux Baseline and Forensic Triage Tool - BETA☆55Updated 2 years ago
- Repository for different Windows DFIR related CMDs, PowerShell CMDlets, etc, plus workshops that I did for different conferences or event…☆78Updated 4 years ago
- Library of threat hunts to get any user started!☆44Updated 4 years ago
- ☆88Updated last year
- Cheat sheets for threat hunting, detection and other stuff.☆34Updated 2 years ago
- Cumulonimbus-UAL_Extractor is a PowerShell based tool created by the Tesorion CERT team to help gather the Unified Audit Logging out of a…☆20Updated last year
- Python based tool to extract forensic info from EventTranscript.db (Windows Diagnostic Data)☆69Updated last year
- This repo is where I store my Threat Hunting ideas/content☆88Updated 2 years ago
- User Feedback Space of #MitreAssistant☆37Updated 2 years ago
- This Repository gives the best and possible strategies against hunting the ransomware☆26Updated 2 years ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆31Updated 5 months ago
- A MITRE ATT&CK Lookup Tool☆45Updated last year
- Forensics artifacts collection☆20Updated 4 years ago
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆36Updated 2 years ago
- Helping Incident Responders hunt for potential persistence mechanisms on UNIX-based systems.☆15Updated last year
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆61Updated 11 months ago
- Random tips and tricks RE: ransomware☆14Updated 3 years ago
- A repository containing the research output from my GCFE Gold Paper which compared Windows 10 and Windows 11.☆27Updated 2 years ago
- Script to automate Linux live evidence collection☆27Updated 2 years ago
- Get-MiniTimeline - Triage Collection and Timeline Generation w/ KAPE☆31Updated last year
- PowerShell scripts for running Magnet RESPONSE forensic collection tool in large enterprises.☆25Updated 6 months ago
- ☆66Updated 2 years ago
- ESXi Cyber Security Incident Response Script☆24Updated 10 months ago
- CarbonBlack EDR detection rules and response actions☆71Updated 10 months ago
- IOC Collection 2022☆57Updated 2 years ago
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆96Updated 2 years ago
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆114Updated last year