☆33Dec 4, 2022Updated 3 years ago
Alternatives and similar repositories for quickforensics
Users that are interested in quickforensics are comparing it to the libraries listed below
Sorting:
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆15Aug 15, 2022Updated 3 years ago
- RMM deployment scripts for Huntress☆56Feb 18, 2026Updated last month
- You didn't think I'd go and leave the blue team out, right?☆1,736Jan 5, 2026Updated 2 months ago
- A scanner to detect the use of stolen FireEye red team tools☆20Dec 18, 2020Updated 5 years ago
- This tool helps #blueteams detect bad actors who may be port scanning the network, and allows #redteams to practice honeypot evasion.☆11Oct 20, 2020Updated 5 years ago
- Helping Incident Responders hunt for potential persistence mechanisms on UNIX-based systems.☆17Oct 28, 2023Updated 2 years ago
- Get-MiniTimeline - Triage Collection and Timeline Generation w/ KAPE☆33May 25, 2024Updated last year
- ☆22Jan 31, 2023Updated 3 years ago
- PowerShell scripts to aid investigators when utilizing O365 and Magnet Axiom.☆12Aug 26, 2024Updated last year
- A repository containing the research output from my GCFE Gold Paper which compared Windows 10 and Windows 11.☆27Jul 27, 2022Updated 3 years ago
- Packet Analysis on Steroids☆13Oct 20, 2022Updated 3 years ago
- ☆62Oct 12, 2024Updated last year
- A preconfigured Windows-based system designed for rapid forensic investigations in both Azure and AWS.☆38Mar 25, 2024Updated last year
- Linux Baseline and Forensic Triage Tool - BETA☆57Mar 10, 2026Updated last week
- This is a powershell module used to access the Pax8 API☆19Apr 20, 2024Updated last year
- ☆17Jan 21, 2026Updated 2 months ago
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆254Oct 29, 2025Updated 4 months ago
- Field guide to gather low-hanging fruits☆14Mar 20, 2025Updated last year
- OneDriveExplorer is a command line and GUI based application for reconstructing the folder structure of OneDrive from the <UserCid>.dat a…☆229Jan 6, 2026Updated 2 months ago
- repo for sharing stuff☆17Jul 1, 2025Updated 8 months ago
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆89Feb 9, 2025Updated last year
- 📡 Ease file sharing during pentest/CTF 🎸☆11Oct 18, 2022Updated 3 years ago
- Command-line tool to search for malware samples in various repositories☆13Mar 3, 2022Updated 4 years ago
- Hunt malware with Volatility☆49Mar 3, 2026Updated 2 weeks ago
- The scrip will help you to find some values info for the user that you need as DFIR☆16Nov 3, 2022Updated 3 years ago
- ☆16Mar 22, 2023Updated 3 years ago
- ☆12Aug 27, 2025Updated 6 months ago
- ☆24Mar 12, 2025Updated last year
- Cyber Threat Intelligence Appliance☆13Dec 8, 2022Updated 3 years ago
- Challenge files☆11Sep 30, 2021Updated 4 years ago
- Jupyter Notebooks for the Blue Team☆40Jan 16, 2025Updated last year
- Using Microsoft 365 App Passwords for persistence☆23Sep 2, 2020Updated 5 years ago
- PerchLabs threat feed☆16Aug 23, 2021Updated 4 years ago
- Full of public notes and Utilities☆132Jan 6, 2026Updated 2 months ago
- Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders☆1,062Oct 5, 2023Updated 2 years ago
- Connectwise Automate - Grafana Dashboards☆17Mar 14, 2019Updated 7 years ago
- Speeding up identifying which binaries with a SUID flag may lead to root access☆15Aug 26, 2024Updated last year
- ☆12Feb 17, 2022Updated 4 years ago
- ☆17Apr 13, 2018Updated 7 years ago