att / docker-forensics
Tools to assist in forensicating docker
☆81Updated last week
Alternatives and similar repositories for docker-forensics:
Users that are interested in docker-forensics are comparing it to the libraries listed below
- A rewrite of mactime, a bodyfile reader☆36Updated 6 months ago
- Digital Forensic Investigative Scripts☆75Updated 3 months ago
- 1-Click push forensics evidence to the cloud☆141Updated 7 months ago
- ☆55Updated this week
- Slides and Other Resources from my latest Talks and Presentations☆24Updated 4 years ago
- Invoke-LiveResponse☆146Updated 2 years ago
- Salt States for Configuring the SIFT Workstation☆98Updated this week
- misp-cloud - Cloud-ready images of MISP☆72Updated 2 years ago
- Yet another registry parser☆130Updated 2 years ago
- A modern Python-3-based alternative to RegRipper☆192Updated 2 months ago
- automate your MISP installs☆66Updated 4 years ago
- Volatility plugins created by the author☆44Updated 9 years ago
- Expert Investigation Guides☆51Updated 3 years ago
- Python script to batch query the Tor Relays and Bridges☆36Updated 5 years ago
- PowerShell No Agent Hunting☆109Updated 6 years ago
- Tools to automate and/or expedite response.☆113Updated 7 months ago
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆37Updated 2 years ago
- Carves and recreates VSS catalog and store from Windows disk image.☆97Updated 2 years ago
- Tools from WFA 4/e, timeline tools, etc.☆134Updated 11 months ago
- A community event for security researchers to share their favorite notebooks☆107Updated last year
- A system that creates a bogus web structure to entrap and delay web scanners☆56Updated 3 years ago
- Yara-Endpoint is a tool useful for incident response as well as anti-malware enpoint base on Yara signatures.☆105Updated 6 years ago
- Simple yara rule manager☆66Updated 2 years ago
- pollen - A command-line tool for interacting with TheHive☆35Updated 5 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆48Updated 2 years ago
- Extract common Windows artifacts from source images and VSCs☆65Updated 3 years ago
- A collection of typical false positive indicators☆55Updated 4 years ago
- Recon Hunt Queries☆76Updated 3 years ago
- Security Monitoring Resolution Categories☆138Updated 3 years ago
- ☆34Updated 4 years ago