The scrip will help you to find some values info for the user that you need as DFIR
☆16Nov 3, 2022Updated 3 years ago
Alternatives and similar repositories for User_Accounts_Hunting
Users that are interested in User_Accounts_Hunting are comparing it to the libraries listed below
Sorting:
- Python script to run battery of Volatility plugins against a forensic memory image☆10Jun 22, 2019Updated 6 years ago
- Packet Analysis on Steroids☆13Oct 20, 2022Updated 3 years ago
- A simple python script to generate nested folders based on user input. The script will also name and place a template report document and…☆11Jun 19, 2025Updated 8 months ago
- /ˈhäjˌpäj/ "a confused mixture."☆13Feb 21, 2026Updated last week
- shell script to create an image and perform initial examination on a drive☆15Feb 28, 2020Updated 6 years ago
- incident response scripts☆18Mar 4, 2019Updated 6 years ago
- ☆24Mar 12, 2025Updated 11 months ago
- A repository dedicated to tracking ransomware families based on leaked builders.☆22Apr 17, 2024Updated last year
- Simple Script to Help You Find All Files Has Been Modified, Accessed, and Created In A Range Time.☆27Dec 1, 2022Updated 3 years ago
- Incident Response Scripts☆30Mar 1, 2020Updated 6 years ago
- Python based tool to extract forensic info from EventTranscript.db (Windows Diagnostic Data)☆68Sep 13, 2023Updated 2 years ago
- Some dfir stuff☆31Jan 12, 2022Updated 4 years ago
- ☆33Dec 4, 2022Updated 3 years ago
- Scripts to integrate DFIR-IRIS, MISP and TimeSketch☆35Feb 2, 2022Updated 4 years ago
- Automatically set traffic rules for Dynamic IP Addresses from a Dynamic DNS Domain☆12May 31, 2022Updated 3 years ago
- ☆33Oct 25, 2021Updated 4 years ago
- Jupyter Notebooks for the Blue Team☆39Jan 16, 2025Updated last year
- A preconfigured Windows-based system designed for rapid forensic investigations in both Azure and AWS.☆39Mar 25, 2024Updated last year
- Lazy SPL to detect Spring4Shell exploitation☆12Jul 8, 2022Updated 3 years ago
- Find your router's default password☆14Apr 7, 2015Updated 10 years ago
- A python script file to forensically examine Microsoft Windows memory-dump files - It can pull usernames, password hashes, extract .pcap …☆10Apr 23, 2021Updated 4 years ago
- Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PE…☆11May 19, 2020Updated 5 years ago
- ☆11Apr 25, 2021Updated 4 years ago
- A config file that's curated for DFIR examiners with shortcuts to common Windows artifacts and settings enabled that help make your life …☆39Jan 6, 2025Updated last year
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆97May 28, 2023Updated 2 years ago
- Automating simple report creating of threat intelligence using ChatGPT and Greynoise API.☆10Oct 3, 2023Updated 2 years ago
- Detection rules and threat hunting queries in Defender XDR and Azure Sentinel☆16Feb 11, 2026Updated 2 weeks ago
- PowerShell scripts to aid investigators when utilizing O365 and Magnet Axiom.☆12Aug 26, 2024Updated last year
- AWS Live Response☆11Sep 19, 2017Updated 8 years ago
- ☆13Aug 17, 2020Updated 5 years ago
- LLM supported Toolkit for Blue Team/ SOC Operations☆46Jan 10, 2026Updated last month
- Training materials I've written.☆11Nov 11, 2025Updated 3 months ago
- Spider or repeater to find all links.☆10Feb 7, 2021Updated 5 years ago
- Jupyter Notebooks for Digital Forensics & Incident Response☆10Nov 23, 2021Updated 4 years ago
- A backtester written in python with NumPy and Pandas, showcasing Dollar-Cost-Averaging (DCA) and DCA with portfolio rebalancing.☆11Nov 29, 2020Updated 5 years ago
- Trading Dollar cost averaging☆10Mar 6, 2023Updated 2 years ago
- ☆13Dec 14, 2021Updated 4 years ago
- ☆10Jan 22, 2025Updated last year
- 🐧 Security-focused Linux distribution with 140+ tools, custom kernel 6.17.13, AI assistant | 5 editions | Cloud, AI/ML, Automotive, Hard…☆29Updated this week