AndrewRathbun / DFIRArtifactMuseumLinks
The goal of this repo is to archive artifacts from all versions of various OS's and categorizing them by type. This will help with artifact validation processes as well as increase access to artifacts that may no longer be readily available anymore.
☆599Updated 4 months ago
Alternatives and similar repositories for DFIRArtifactMuseum
Users that are interested in DFIRArtifactMuseum are comparing it to the libraries listed below
Sorting:
- Collection of Event ID ressources useful for Digital Forensics and Incident Response☆620Updated last year
- The official repo for a project involving a crowdsourced DFIR book. The main purpose of this book is to give anyone interested an opportu…☆213Updated 5 months ago
- Set of EVTX samples (>270) mapped to MITRE ATT&CK tactic and techniques to measure your SIEM coverage or developed new use cases.☆581Updated 6 months ago
- A repository of DFIR-related Mind Maps geared towards the visual learners!☆526Updated 2 years ago
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆326Updated 2 months ago
- Set of SIGMA rules (>350) mapped to MITRE ATT&CK tactic and techniques☆372Updated 6 months ago
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆198Updated last year
- This repository serves as a place for community created Targets and Modules for use with KAPE.☆747Updated last week
- Documentation and scripts to properly enable Windows event logs.☆620Updated last year
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆264Updated last week
- ☆515Updated 9 months ago
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆722Updated 3 months ago
- The Volatility Collaborative GUI☆246Updated this week
- A repo that contains recursive directory listings (using PowerShell) of a vanilla (clean) install of every Windows OS version to compare …☆168Updated 7 months ago
- Repository of attack and defensive information for Business Email Compromise investigations☆257Updated 2 months ago
- Awesome list of keywords and artifacts for Threat Hunting sessions☆585Updated last week
- CyLR - Live Response Collection Tool☆684Updated 3 years ago
- MemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR☆649Updated 3 weeks ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆260Updated 3 months ago
- Rules generated from our investigations.☆196Updated 3 weeks ago
- Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders☆920Updated last year
- A python script developed to process Windows memory images based on triage type.☆263Updated last year
- UAC is a powerful and extensible incident response tool designed for forensic investigators, security analysts, and IT professionals. It …☆1,015Updated this week
- Harness the power of Splunk for your investigations☆116Updated 3 weeks ago
- Handbook of windows forensic artifacts across multiple Windows version with interpretation tips and some examples. Work in progress!☆364Updated 11 months ago
- Repository for threat hunting and detection queries, etc. for Defender for Endpoint and Microsoft Sentinel in KQL(Kusto Query Language).☆737Updated 4 months ago
- Public script from SANS FOR509 Enterprise Cloud Incident Response☆203Updated 10 months ago
- Get all my software☆165Updated last month
- A forensics tool to convert the data in the Windows srum (System Resource Usage Monitor) database to an xlsx spreadsheet.☆695Updated last month
- Jupyter Notebooks for the Blue Team☆145Updated 3 months ago