Memory Forensic System on Cloud
☆92Dec 21, 2023Updated 2 years ago
Alternatives and similar repositories for MemoryForensic-on-Cloud
Users that are interested in MemoryForensic-on-Cloud are comparing it to the libraries listed below
Sorting:
- Surface Analysis System on Cloud☆19Dec 21, 2023Updated 2 years ago
- Automatically update IoC for lucky visitor scam☆26Apr 9, 2025Updated 10 months ago
- Untitled Goose Tool is a robust and flexible hunt and incident response tool that adds novel authentication and data gathering methods in…☆949Feb 11, 2026Updated 3 weeks ago
- Python CLI covering the FileScan.IO API - enabling automatic interaction with www.filescan.io or private instances☆16Jul 15, 2025Updated 7 months ago
- Tool to perform differential fault analysis attack (DFA) on whiteboxes with external encodings.☆16Feb 10, 2023Updated 3 years ago
- A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE AT…☆1,208Feb 20, 2026Updated last week
- A tool for AWS incident response, that allows for enumeration, acquisition and analysis of data from AWS environments for the purpose of …☆198Jan 6, 2026Updated last month
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆341Dec 3, 2025Updated 3 months ago
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.☆31Jul 12, 2023Updated 2 years ago
- A standard allowing organizations to nominate security contact points and policies via DNS TXT records.☆34Jun 4, 2025Updated 9 months ago
- The Business Email Compromise Guide sets out to describe 10 steps for performing a Business Email Compromise (BEC) investigation in an Of…☆277Feb 2, 2021Updated 5 years ago
- A web front-end for password cracking and analytics☆16Jan 6, 2019Updated 7 years ago
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆37Jul 11, 2023Updated 2 years ago
- Git for me to put all my forensics stuff☆23Sep 2, 2025Updated 6 months ago
- MemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR☆696Oct 22, 2025Updated 4 months ago
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆338Feb 13, 2026Updated 2 weeks ago
- Powershell module for VMWare vSphere forensics☆167Nov 8, 2024Updated last year
- Repository for scripts and tips for "Yara Scan Service"☆20Feb 19, 2023Updated 3 years ago
- Signatures and IoCs from public Volexity blog posts.☆364Dec 4, 2025Updated 2 months ago
- Curated Windows event log Sigma rules used in Hayabusa and Velociraptor.☆214Feb 16, 2026Updated 2 weeks ago
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆253Nov 18, 2024Updated last year
- Ransomware dataset, containing dynamic behaviour of more than 60 distinct ransomware families.☆10Aug 29, 2022Updated 3 years ago
- bitCollector - DFIR (Digital Forensics and Incident Response) Triage Collector☆13Aug 18, 2025Updated 6 months ago
- Public script from SANS FOR509 Enterprise Cloud Incident Response☆221Oct 26, 2025Updated 4 months ago
- A collection of various SIEM rules relating to malware family groups.☆70Jun 18, 2024Updated last year
- Cybersecurity Evaluation Tool☆1,770Updated this week
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆70Feb 3, 2022Updated 4 years ago
- Documentation and scripts to properly enable Windows event logs.☆672Oct 3, 2025Updated 5 months ago
- Sysmon EDR POC Build within Powershell to prove ability.☆223May 1, 2021Updated 4 years ago
- Yara rules☆22Mar 27, 2023Updated 2 years ago
- Python library to carry out DFIR analysis on the Cloud☆500Updated this week
- GUI for regripper☆11Mar 19, 2019Updated 6 years ago
- Anteater is Reconnaissance tool for discovering interesting files and folders in a web application that most likely has been misconfigure…☆13Jun 12, 2024Updated last year
- ☆14Dec 6, 2023Updated 2 years ago
- Collection of malware ioc hashes from blog posts. A Python script is provided to search through it.☆19Sep 10, 2020Updated 5 years ago
- Various Crypter Project☆10Feb 26, 2014Updated 12 years ago
- Recordization library☆11Updated this week
- ☆10Nov 21, 2023Updated 2 years ago
- ☆12Feb 24, 2023Updated 3 years ago