andreafortuna / malhunt
Hunt malware with Volatility
☆48Updated 10 months ago
Alternatives and similar repositories for malhunt:
Users that are interested in malhunt are comparing it to the libraries listed below
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆44Updated 3 years ago
- Random notes collected on the intertubes relating to DFIR☆32Updated last year
- ☆33Updated 4 months ago
- ☆86Updated last year
- Logbook for Digital Forensics and Incident Response☆50Updated 8 months ago
- ☆5Updated 4 months ago
- A repo for centralizing ongoing research on the new Windows 10/11 DFIR artifact, EventTranscript.db.☆39Updated 2 years ago
- CSIRT Jump Bag☆27Updated 10 months ago
- Extract BITS jobs from QMGR queue and store them as CSV records☆75Updated last month
- An advanced parser for INDX records☆27Updated 5 years ago
- Cyber Threats Detection Rules☆14Updated 2 months ago
- Collection of useful, up to date, Carbon Black Response Queries☆83Updated 4 years ago
- My Jupyter Notebooks☆36Updated 11 months ago
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Updated 2 years ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆56Updated last month
- ☆39Updated 5 years ago
- Memory Baseliner is a script that can compare two windows memory images or perform frequency of occurrence / data stacking analysis on mu…☆52Updated last year
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆112Updated last year
- Stand-alone parser for User Access Logging from Server 2012 and newer systems☆71Updated last year
- Defence Against the Dark Arts☆34Updated 5 years ago
- ☆77Updated 5 years ago
- Automagically extract forensic timeline from volatile memory dump☆128Updated 10 months ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆54Updated 3 years ago
- Threat Hunter's Knowledge Base☆22Updated 3 years ago
- Collection of scripts provided for public use☆34Updated 2 weeks ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆67Updated 2 weeks ago
- A completely unsupported set of scripts used in SANS FOR572, Advanced Network Forensics and Analysis☆26Updated 3 months ago
- Script to automate Linux live evidence collection☆27Updated 2 years ago
- ReWrite of AChoir in Go for Cross Platform☆39Updated 2 weeks ago
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆61Updated 2 years ago