andreafortuna / malhunt
Hunt malware with Volatility
☆47Updated last year
Alternatives and similar repositories for malhunt:
Users that are interested in malhunt are comparing it to the libraries listed below
- Random notes collected on the intertubes relating to DFIR☆32Updated last year
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆44Updated 3 years ago
- ☆34Updated 6 months ago
- Collection of scripts provided for public use☆34Updated last week
- ☆87Updated last year
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Updated 2 years ago
- Logbook for Digital Forensics and Incident Response☆50Updated 9 months ago
- CSIRT Jump Bag☆26Updated last year
- A repo for centralizing ongoing research on the new Windows 10/11 DFIR artifact, EventTranscript.db.☆39Updated 2 years ago
- Stand-alone parser for User Access Logging from Server 2012 and newer systems☆73Updated last year
- Extract BITS jobs from QMGR queue and store them as CSV records☆75Updated 2 months ago
- ☆6Updated 6 months ago
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Updated last year
- A completely unsupported set of scripts used in SANS FOR572, Advanced Network Forensics and Analysis☆27Updated 5 months ago
- Digital Forensics Artifacts Knowledge Base☆81Updated 11 months ago
- Script to automate Linux live evidence collection☆27Updated 2 years ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆55Updated 3 months ago
- ☆77Updated 5 years ago
- Collection of useful, up to date, Carbon Black Response Queries☆83Updated 4 years ago
- A sample VHDX file with multiple verbose examples of forensic and anti-forensics artifacts. Meant to be basic and can be expanded upon. P…☆26Updated 2 years ago
- Rhaegal is a tool written in Python 3 used to scan Windows Event Logs for suspicious logs. Rhaegal uses custom rule format to detect sus…☆38Updated last year
- An advanced parser for INDX records☆27Updated 5 years ago
- Defence Against the Dark Arts☆34Updated 5 years ago
- Automagically extract forensic timeline from volatile memory dump☆130Updated last year
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆114Updated last year
- Get-MiniTimeline - Triage Collection and Timeline Generation w/ KAPE☆31Updated 11 months ago
- Blueteam operational triage registry hunting/forensic tool.☆145Updated last year
- ☆29Updated 4 years ago
- My Jupyter Notebooks☆36Updated last month
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆63Updated 2 years ago