☆176Jan 26, 2021Updated 5 years ago
Alternatives and similar repositories for Fastir_Collector_Linux
Users that are interested in Fastir_Collector_Linux are comparing it to the libraries listed below
Sorting:
- ☆519Jan 26, 2021Updated 5 years ago
- Live forensic artifacts collector☆172Jul 5, 2024Updated last year
- Tools for parsing Forensic images☆41Dec 14, 2018Updated 7 years ago
- Python unbup script for McAfee .bup files (with some additional fun features). This script is fully implemented in python it's not just a…☆37Apr 24, 2018Updated 7 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆44Mar 11, 2016Updated 9 years ago
- ☆280Apr 6, 2023Updated 2 years ago
- Automating forensic data extraction, reduction, and overall triage of cold disk and memory images.☆21Mar 12, 2019Updated 6 years ago
- Rekall Forensics and Incident Response Framework with rVMI extensions☆33Mar 25, 2021Updated 4 years ago
- Windows Live Artifacts Acquisition Script☆190Jun 20, 2022Updated 3 years ago
- Web App for Volatility framework☆390Jan 13, 2026Updated last month
- This repository is a curated list of pro bono incident response entities.☆21Jun 21, 2023Updated 2 years ago
- The Cold Disk Quick Response (CDQR) tool is a fast and easy to use forensic artifact parsing tool that works on disk images, mounted driv…☆343Jun 25, 2022Updated 3 years ago
- Malcom - Malware Communications Analyzer☆1,164Nov 29, 2017Updated 8 years ago
- Allows you to quickly query a Windows machine for RAM artifacts☆218Jul 17, 2020Updated 5 years ago
- Incident Response Forensic Framework☆611Nov 20, 2019Updated 6 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆15Jun 12, 2023Updated 2 years ago
- A GC link parser for both linkfiles and jumplists.☆18Oct 28, 2016Updated 9 years ago
- A Powershell incident response framework☆1,640Nov 22, 2022Updated 3 years ago
- ☆309Aug 14, 2020Updated 5 years ago
- Investigate suspicious activity by visualizing Sysmon's event log☆431Dec 22, 2023Updated 2 years ago
- A Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.☆487Feb 21, 2021Updated 5 years ago
- Burp extension to quickly and easily develop Python complex exploits based on Burp proxy requests.☆32Nov 29, 2015Updated 10 years ago
- Extract unencrypted SSH keys from pageant memory dump☆15Oct 3, 2015Updated 10 years ago
- Web interface for the Volatility Memory Forensics Framework☆260Nov 21, 2017Updated 8 years ago
- Simulating Adversary Operations☆97Apr 13, 2018Updated 7 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Mar 26, 2016Updated 9 years ago
- Carve NTFS USN records from binary data☆27May 21, 2017Updated 8 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆78Jul 2, 2020Updated 5 years ago
- Collect, Process, and Hunt with host based data from MacOS, Windows, and Linux☆505Oct 21, 2022Updated 3 years ago
- Script for automating Linux memory capture and analysis☆274Feb 1, 2020Updated 6 years ago
- Extract common Windows artifacts from source images and VSCs☆64May 10, 2021Updated 4 years ago
- Windows Events Attack Samples☆2,515Jan 24, 2023Updated 3 years ago
- ☆349Mar 19, 2021Updated 4 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- Quick lookup files for SUNBURST Backdoor☆12Dec 15, 2020Updated 5 years ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- A curated list of tools for incident response☆8,832Jul 18, 2024Updated last year
- Tools for the Computer Incident Response Team☆150Apr 17, 2017Updated 8 years ago
- ☆16Jan 31, 2015Updated 11 years ago