KasperskyLab / ForensicsTools
Tools for DFIR
☆117Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for ForensicsTools
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆80Updated 7 years ago
- Python script to decode common encoded PowerShell scripts☆215Updated 6 years ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆106Updated 4 years ago
- PowerShell No Agent Hunting☆108Updated 6 years ago
- Invoke-LiveResponse☆145Updated 2 years ago
- Yet another registry parser☆130Updated 2 years ago
- A modern Python-3-based alternative to RegRipper☆187Updated 2 weeks ago
- EVTXtract recovers and reconstructs fragments of EVTX log files from raw binary data, including unallocated space and memory images.☆189Updated 4 years ago
- Sandbox feature upgrade with the help of wrapped samples☆75Updated 6 years ago
- SEC599 supporting GitHub repository☆15Updated 5 years ago
- Tools from WFA 4/e, timeline tools, etc.☆132Updated 8 months ago
- ☆347Updated 3 years ago
- Windows Live Artifacts Acquisition Script☆183Updated 2 years ago
- Collecting & Hunting for IOCs with gusto and style☆237Updated 3 years ago
- A collection of infosec related scripts and information.☆53Updated last month
- Page File analysis tools.☆124Updated 8 years ago
- Extract common Windows artifacts from source images and VSCs☆65Updated 3 years ago
- Test Blue Team detections without running any attack.☆271Updated 6 months ago
- ☆273Updated last year
- All materials from our Black Hat 2018 "Subverting Sysmon" talk☆136Updated 6 years ago
- Office365 Log Analysis Framework☆81Updated 5 years ago
- Lazy Office Analyzer☆119Updated 7 years ago
- IR-Tools - PowerShell tools for IR☆128Updated 7 years ago
- Mitre Att&ck Technique Emulation☆82Updated 5 years ago
- Understanding ATT&CK Matrix for Enterprise☆79Updated 6 years ago
- Reconstruct process trees from event logs☆146Updated 4 years ago
- Simulating Adversary Operations☆93Updated 6 years ago
- Allows you to quickly query a Windows machine for RAM artifacts☆218Updated 4 years ago
- Lists of sources and utilities utilized to hunt, detect and prevent evildoers.☆162Updated 5 years ago