andreafortuna / malhunt
Hunt malware with Volatility
☆47Updated 9 months ago
Alternatives and similar repositories for malhunt:
Users that are interested in malhunt are comparing it to the libraries listed below
- Random notes collected on the intertubes relating to DFIR☆32Updated last year
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆44Updated 3 years ago
- ☆86Updated last year
- ☆33Updated 3 months ago
- Logbook for Digital Forensics and Incident Response☆50Updated 7 months ago
- Collection of scripts provided for public use☆34Updated 3 months ago
- Automagically extract forensic timeline from volatile memory dump☆126Updated 9 months ago
- A repo for centralizing ongoing research on the new Windows 10/11 DFIR artifact, EventTranscript.db.☆39Updated 2 years ago
- Collection of useful, up to date, Carbon Black Response Queries☆83Updated 4 years ago
- CSIRT Jump Bag☆27Updated 9 months ago
- Stand-alone parser for User Access Logging from Server 2012 and newer systems☆72Updated last year
- Extract BITS jobs from QMGR queue and store them as CSV records☆75Updated this week
- Volatility plugins created by the author☆44Updated 9 years ago
- An advanced parser for INDX records☆27Updated 5 years ago
- A collection of Terraform and Ansible scripts that automatically (and quickly) deploys a small Velociraptor R&D lab.☆20Updated 3 years ago
- Repository for SPEED SIEM Use Case Framework☆53Updated 4 years ago
- ☆5Updated 3 months ago
- Script to automate Linux live evidence collection☆27Updated 2 years ago
- ☆30Updated 3 years ago
- ☆39Updated 5 years ago
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Updated 2 years ago
- A completely unsupported set of scripts used in SANS FOR572, Advanced Network Forensics and Analysis☆25Updated 2 months ago
- ☆77Updated 5 years ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆56Updated 3 weeks ago
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆61Updated 2 years ago
- Simple yara rule manager☆66Updated 2 years ago
- Get-MiniTimeline - Triage Collection and Timeline Generation w/ KAPE☆29Updated 8 months ago
- Rhaegal is a tool written in Python 3 used to scan Windows Event Logs for suspicious logs. Rhaegal uses custom rule format to detect sus…☆39Updated last year
- Digital Forensics Artifacts Knowledge Base☆77Updated 8 months ago
- Memory Baseliner is a script that can compare two windows memory images or perform frequency of occurrence / data stacking analysis on mu…☆51Updated last year