andreafortuna / malhunt
Hunt malware with Volatility
☆47Updated 11 months ago
Alternatives and similar repositories for malhunt:
Users that are interested in malhunt are comparing it to the libraries listed below
- Random notes collected on the intertubes relating to DFIR☆32Updated last year
- ☆87Updated last year
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆44Updated 3 years ago
- Collection of scripts provided for public use☆34Updated last week
- Logbook for Digital Forensics and Incident Response☆50Updated 9 months ago
- ☆34Updated 5 months ago
- My Jupyter Notebooks☆36Updated last month
- CSIRT Jump Bag☆26Updated 11 months ago
- ☆28Updated 4 years ago
- Stand-alone parser for User Access Logging from Server 2012 and newer systems☆73Updated last year
- A repo for centralizing ongoing research on the new Windows 10/11 DFIR artifact, EventTranscript.db.☆39Updated 2 years ago
- Script to automate Linux live evidence collection☆27Updated 2 years ago
- Get-MiniTimeline - Triage Collection and Timeline Generation w/ KAPE☆30Updated 10 months ago
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Updated 2 years ago
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆114Updated last year
- ☆6Updated 5 months ago
- Extract BITS jobs from QMGR queue and store them as CSV records☆75Updated 2 months ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆55Updated 2 months ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆54Updated 3 years ago
- Collection of useful, up to date, Carbon Black Response Queries☆83Updated 4 years ago
- Information about the open-source-dfir slack community☆29Updated last year
- An advanced parser for INDX records☆27Updated 5 years ago
- A completely unsupported set of scripts used in SANS FOR572, Advanced Network Forensics and Analysis☆26Updated 4 months ago
- Parses KAPE module files and downloads binaries referenced by BinaryURL☆18Updated 5 years ago
- Memory Baseliner is a script that can compare two windows memory images or perform frequency of occurrence / data stacking analysis on mu…☆52Updated last year
- Reference sheet for Threat Hunting Professional Course☆25Updated 6 years ago
- Automagically extract forensic timeline from volatile memory dump☆130Updated 11 months ago
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Updated last year
- Volatility plugins created by the author☆44Updated 9 years ago
- Cumulonimbus-UAL_Extractor is a PowerShell based tool created by the Tesorion CERT team to help gather the Unified Audit Logging out of a…☆19Updated last year