LDO-CERT / orochiLinks
The Volatility Collaborative GUI
β246Updated this week
Alternatives and similar repositories for orochi
Users that are interested in orochi are comparing it to the libraries listed below
Sorting:
- π§ The artifactcollector is a customizable agent to collect forensic artifacts on any Windows, macOS or Linux systemβ290Updated 2 months ago
- A python script developed to process Windows memory images based on triage type.β263Updated last year
- β206Updated last month
- A repo that contains recursive directory listings (using PowerShell) of a vanilla (clean) install of every Windows OS version to compare β¦β168Updated 7 months ago
- The goal of this repo is to archive artifacts from all versions of various OS's and categorizing them by type. This will help with artifaβ¦β599Updated 4 months ago
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.β326Updated 2 months ago
- Memory acquisition for Linux that makes sense.β199Updated last year
- β136Updated 2 weeks ago
- This repository contains helper scripts and custom configs to get the best out of Google's Timesketch project.β110Updated last year
- Harness the power of Splunk for your investigationsβ116Updated 3 weeks ago
- The official repo for a project involving a crowdsourced DFIR book. The main purpose of this book is to give anyone interested an opportuβ¦β213Updated 5 months ago
- Automated YARA Rule Standardization and Quality Assurance Toolβ228Updated last week
- An NTFS/FAT parser for digital forensics & incident responseβ205Updated 8 months ago
- Rules generated from our investigations.β196Updated 3 weeks ago
- Open Source Platform for storing, organizing, and searching documents related to cyber threatsβ164Updated last year
- Malware repository component for samples & static configuration with REST API interface.β362Updated 3 weeks ago
- Signatures and IoCs from public Volexity blog posts.β355Updated last month
- Curated Windows event log Sigma rules used in Hayabusa and Velociraptor.β185Updated this week
- Artifact collection tool for *nix systemsβ209Updated last year
- β8Updated 8 months ago
- Live forensic artifacts collectorβ168Updated last year
- Rules shared by the community from 100 Days of YARA 2024β85Updated 6 months ago
- Jupyter Notebooks for the Blue Teamβ145Updated 3 months ago
- JPCERT/CC public YARA rules repositoryβ110Updated 7 months ago
- A curated list of KAPE-related resourcesβ169Updated 2 months ago
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.β96Updated 2 years ago
- acquire is a tool to quickly gather forensic artifacts from disk images or a live system into a lightweight container.β104Updated 2 weeks ago
- A guide on how to write fast and memory friendly YARA rulesβ145Updated 5 months ago
- Get all my softwareβ165Updated last month
- Incident Response collection and processing scripts with automated reporting scriptsβ306Updated last year