Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.
☆32Nov 23, 2025Updated 3 months ago
Alternatives and similar repositories for elrond
Users that are interested in elrond are comparing it to the libraries listed below
Sorting:
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- Get USB Devices from Registry hives☆22Nov 15, 2021Updated 4 years ago
- Linux Post-Exploitation tools wrapper☆20Mar 21, 2023Updated 2 years ago
- Threat Box Assessment Tool☆19Aug 15, 2021Updated 4 years ago
- A python script developed to process Windows memory images based on triage type.☆266Nov 25, 2023Updated 2 years ago
- ☆41Apr 5, 2025Updated 10 months ago
- This repository provide a json file for all Windows security Event IDs with lot of useful informations (Categories, GPO, Volume, Recomman…☆11Mar 2, 2023Updated 3 years ago
- An exercise to practice deobfuscating PowerShell Scripts.☆26Feb 10, 2023Updated 3 years ago
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆118Nov 28, 2023Updated 2 years ago
- Launches a limited shell using PowerShell Runspaces with an optional AMSI Bypass. Does not invoke Powershell.exe☆13Dec 11, 2023Updated 2 years ago
- ☆62Oct 12, 2024Updated last year
- ☆12May 19, 2025Updated 9 months ago
- Tool to extract contents from the memory of Windows systems.☆13Jul 4, 2023Updated 2 years ago
- This script is to build Wazuh 4.3 environment☆11May 30, 2022Updated 3 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆12Jul 1, 2021Updated 4 years ago
- A modified fork of Be.HexEditor for use in debug tools☆15Jan 5, 2022Updated 4 years ago
- A collection of tools adversaries commonly use in an attack.☆14Nov 23, 2024Updated last year
- ☆17Jun 28, 2023Updated 2 years ago
- ☆16Mar 22, 2023Updated 2 years ago
- ☆28Mar 29, 2022Updated 3 years ago
- Recipes for GCHQ's CyberChef Web App☆39Nov 15, 2018Updated 7 years ago
- ☆99Sep 15, 2025Updated 5 months ago
- ☆33Feb 26, 2022Updated 4 years ago
- Personal settings for X-Ways Forensics☆32Apr 28, 2022Updated 3 years ago
- ☆34Aug 8, 2023Updated 2 years ago
- macOS forensic timeline generator using the analysis result DBs of mac_apt☆93Sep 7, 2023Updated 2 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆134Jan 31, 2022Updated 4 years ago
- MISP to Splunk Enterprise Security Theat Intelligence Framework Integration☆14Jul 11, 2023Updated 2 years ago
- Carve file metadata from NTFS index ($I30) attributes☆71Feb 3, 2024Updated 2 years ago
- The Linux DFIR Collector is a stand-alone collection tool for Gnu / Linux. Dump artifacts in json format with very few impacts on the hos…☆32Mar 9, 2022Updated 3 years ago
- Digital Forensics date and time☆23Dec 22, 2025Updated 2 months ago
- ☆19Aug 2, 2020Updated 5 years ago
- Resources for SANS CTI Summit 2021 presentation☆104Nov 8, 2023Updated 2 years ago
- A suite of Volatility 3 plugins for memory forensics of Docker containers☆18Jan 10, 2024Updated 2 years ago
- Volatility, on Docker 🐳☆41Nov 20, 2025Updated 3 months ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Jan 18, 2022Updated 4 years ago
- A series of PowerShell scripts to automate collection of forensic artefacts in most Incident Response environments☆65Jan 31, 2022Updated 4 years ago
- OneDriveExplorer is a command line and GUI based application for reconstructing the folder structure of OneDrive from the <UserCid>.dat a…☆229Jan 6, 2026Updated last month
- DFIRTrack - The Incident Response Tracking Application☆532Jan 13, 2026Updated last month