Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of particular use when investigating a security incident.
☆254Nov 18, 2024Updated last year
Alternatives and similar repositories for varc
Users that are interested in varc are comparing it to the libraries listed below
Sorting:
- A python script developed to process Windows memory images based on triage type.☆266Nov 25, 2023Updated 2 years ago
- ☆24Mar 12, 2025Updated last year
- CryptnetURLCacheParser is a tool to parse CryptAPI cache files☆21Aug 3, 2024Updated last year
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆173Mar 2, 2026Updated 2 weeks ago
- A tool for AWS incident response, that allows for enumeration, acquisition and analysis of data from AWS environments for the purpose of …☆198Jan 6, 2026Updated 2 months ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆133Jan 31, 2022Updated 4 years ago
- Artifact collection tool for *nix systems☆213Mar 20, 2024Updated 2 years ago
- ☆11Aug 3, 2018Updated 7 years ago
- cloudgrep is grep for cloud storage☆326Mar 14, 2026Updated last week
- MemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR☆701Oct 22, 2025Updated 5 months ago
- Dissect is a digital forensics & incident response framework and toolset that allows you to quickly access and analyse forensic artefacts…☆1,094Feb 25, 2026Updated 3 weeks ago
- Blueteam operational triage registry hunting/forensic tool.☆149Sep 2, 2025Updated 6 months ago
- Just Another broken Registry Parser (JARP)☆16May 23, 2024Updated last year
- Windows Forensics Salt States☆21Updated this week
- Forensic Artifact Collection Tool for macOS☆118Jul 28, 2025Updated 7 months ago
- UAC is a powerful and extensible incident response tool designed for forensic investigators, security analysts, and IT professionals. It …☆1,255Mar 14, 2026Updated last week
- Aftermath is a free macOS IR framework☆570Sep 25, 2025Updated 5 months ago
- Parser for Sdba memory pool tags☆21Jul 16, 2021Updated 4 years ago
- ☆14Jun 20, 2022Updated 3 years ago
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆89Feb 9, 2025Updated last year
- Compares and analyzes GCP IAM roles.☆78Mar 9, 2025Updated last year
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆340Dec 3, 2025Updated 3 months ago
- Scripts to for ready-to-use Velociraptor instance deployment in Azure☆14Jun 27, 2023Updated 2 years ago
- PowerShell module for Office 365 and Azure log collection☆280Sep 22, 2025Updated 6 months ago
- Yet Another Memory Analyzer for malware detection☆204Apr 8, 2025Updated 11 months ago
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆118Nov 28, 2023Updated 2 years ago
- Rhaegal is a tool written in Python 3 used to scan Windows Event Logs for suspicious logs. Rhaegal uses custom rule format to detect sus…☆43Sep 21, 2023Updated 2 years ago
- Slack bot which promotes Defense in Depth/Zero Trust security practices☆24Jan 17, 2023Updated 3 years ago
- Google Filestream Forensic Tool☆22Mar 10, 2022Updated 4 years ago
- This repo contains IOC, malware and malware analysis associated with Public cloud☆249Nov 11, 2024Updated last year
- Linux #rootkit and #malware revealer☆31Aug 1, 2024Updated last year
- Carbon Black Response IR tool☆55Dec 10, 2020Updated 5 years ago
- Collaborative Incident Response platform☆1,444Feb 16, 2026Updated last month
- Cmdlets for capturing Windows Events☆14Mar 11, 2022Updated 4 years ago
- ReWrite of AChoir in Go for Cross Platform forensic artifact collection and processing☆41Feb 28, 2026Updated 3 weeks ago
- BlueHound - pinpoint the security issues that actually matter☆761Jul 12, 2023Updated 2 years ago
- Production-ready detection & response queries for osquery☆601Aug 13, 2025Updated 7 months ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- Windows symbol tables for Volatility 3☆93Jul 11, 2024Updated last year