AndrewRathbun / DFIRArtifactMuseumLinks
The goal of this repo is to archive artifacts from all versions of various OS's and categorizing them by type. This will help with artifact validation processes as well as increase access to artifacts that may no longer be readily available anymore.
☆619Updated this week
Alternatives and similar repositories for DFIRArtifactMuseum
Users that are interested in DFIRArtifactMuseum are comparing it to the libraries listed below
Sorting:
- Collection of Event ID ressources useful for Digital Forensics and Incident Response☆631Updated last year
- Set of SIGMA rules (>350) mapped to MITRE ATT&CK tactic and techniques☆392Updated 9 months ago
- A repository of DFIR-related Mind Maps geared towards the visual learners!☆533Updated 3 years ago
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆279Updated this week
- Set of EVTX samples (>270) mapped to MITRE ATT&CK tactic and techniques to measure your SIEM coverage or developed new use cases.☆592Updated 9 months ago
- The official repo for a project involving a crowdsourced DFIR book. The main purpose of this book is to give anyone interested an opportu…☆217Updated 8 months ago
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆335Updated last week
- This repository serves as a place for community created Targets and Modules for use with KAPE.☆772Updated 2 weeks ago
- A repo that contains recursive directory listings (using PowerShell) of a vanilla (clean) install of every Windows OS version to compare …☆181Updated 3 weeks ago
- Rules generated from our investigations.☆202Updated 4 months ago
- The Volatility Collaborative GUI☆254Updated this week
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆199Updated last year
- Documentation and scripts to properly enable Windows event logs.☆638Updated 3 weeks ago
- Repository of attack and defensive information for Business Email Compromise investigations☆265Updated 5 months ago
- ☆513Updated last year
- CyLR - Live Response Collection Tool☆692Updated 3 years ago
- Public script from SANS FOR509 Enterprise Cloud Incident Response☆210Updated last month
- Harness the power of Splunk for your investigations☆135Updated 2 weeks ago
- Awesome list of keywords and artifacts for Threat Hunting sessions☆611Updated 2 months ago
- Repository for threat hunting and detection queries, etc. for Defender for Endpoint and Microsoft Sentinel in KQL(Kusto Query Language).☆770Updated 3 weeks ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆267Updated 7 months ago
- Indexes for SANS Courses and GIAC Certifications☆262Updated last year
- Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders☆946Updated 2 years ago
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆749Updated 6 months ago
- 🧭 The artifactcollector is a customizable agent to collect forensic artifacts on any Windows, macOS or Linux system☆296Updated 5 months ago
- Get all my software☆174Updated 4 months ago
- Cyber Incident Response Team Playbook Battle Cards☆418Updated last year
- A python script developed to process Windows memory images based on triage type.☆265Updated last year
- Scripts for rapid Windows endpoint "tactical triage" and investigations with Velociraptor and KAPE☆160Updated last month
- Jupyter Notebooks for the Blue Team☆146Updated 7 months ago