CyberDefenseInstitute / CDIRLinks
CDIR (Cyber Defense Institute Incident Response) Collector - live collection tool based on oss tool/library
☆163Updated last year
Alternatives and similar repositories for CDIR
Users that are interested in CDIR are comparing it to the libraries listed below
Sorting:
- CDIR Analyzer - parsers for data collected by CDIR Collector☆18Updated 2 years ago
- Cuckoo Sandbox plugin for extracts configuration data of known malware☆135Updated last year
- RustyBlue is a rust implementation of DeepblueCLI, a forensics log analyzer for finding evidence of compromise from windows event logs.☆72Updated 3 years ago
- Volatility plugin for extracts configuration data of known malware☆493Updated last year
- EXIST is a web application for aggregating and analyzing cyber threat intelligence.☆152Updated 2 years ago
- R-CSIRT Linux Triage tool☆39Updated 7 years ago
- Artifact analysis tools by JPCERT/CC Analysis Center☆463Updated 2 months ago
- 分析ツール結果シート☆19Updated 7 years ago
- A DFIR tool to analyze artifacts on macOS☆33Updated 4 years ago
- Ghidra Script for automated analysis of EMOTET☆17Updated 4 years ago
- Investigate suspicious activity by visualizing Sysmon's event log☆425Updated last year
- An NTFS/FAT parser for digital forensics & incident response☆213Updated 3 weeks ago
- Cuckoo running in a nested hypervisor☆128Updated 5 years ago
- [BHUSA 2018 Arsenal] Integrated tool to analyze Drive-by Download attack☆107Updated 2 years ago
- ☆306Updated 5 years ago
- Set of Yara rules for finding files using magics headers☆141Updated 5 years ago
- EVTXtract recovers and reconstructs fragments of EVTX log files from raw binary data, including unallocated space and memory images.☆199Updated 7 months ago
- Carves and recreates VSS catalog and store from Windows disk image.☆100Updated 2 years ago
- A lightweight tool to load Windows Event Log evtx files into Elasticsearch.☆119Updated 4 years ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆265Updated 6 years ago
- Mindmaps for threat hunting - work in progress.☆151Updated 3 years ago
- Hollowfind is a Volatility plugin to detect different types of process hollowing techniques used in the wild to bypass, confuse, deflect …☆141Updated 3 years ago
- An advanced memory forensics framework☆96Updated 6 years ago
- Yet another registry parser☆136Updated 3 years ago
- Various capabilities for static malware analysis.☆79Updated last year
- Fuzzy Hash calculated from import API of PE files☆90Updated 3 years ago
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆62Updated last year
- MAEC Schemas and Schema Development☆88Updated 5 years ago
- Automagically extract forensic timeline from volatile memory dump☆132Updated last year
- Automatic deployment of Cuckoo Sandbox malware lab using Packer and Vagrant☆238Updated 2 years ago