cyberg3cko / elrond
Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.
☆32Updated last month
Alternatives and similar repositories for elrond:
Users that are interested in elrond are comparing it to the libraries listed below
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Updated 2 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Updated 3 weeks ago
- ☆41Updated 11 months ago
- A sample VHDX file with multiple verbose examples of forensic and anti-forensics artifacts. Meant to be basic and can be expanded upon. P…☆25Updated 2 years ago
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 4 years ago
- A repository containing the research output from my GCFE Gold Paper which compared Windows 10 and Windows 11.☆26Updated 2 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆51Updated 2 months ago
- Can you pay the ransom in your country?☆13Updated last year
- Logbook for Digital Forensics and Incident Response☆50Updated 7 months ago
- Threat Box Assessment Tool☆19Updated 3 years ago
- ☆14Updated last year
- Hundred Days of Yara Challenge☆12Updated 2 years ago
- Random tips and tricks RE: ransomware☆14Updated 3 years ago
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆36Updated last year
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Updated 10 months ago
- ☆38Updated 3 years ago
- Yara rules☆20Updated last year
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- ☆20Updated last year
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆23Updated 3 years ago
- ☆34Updated 2 years ago
- ☆17Updated 6 months ago
- ReWrite of AChoir in Go for Cross Platform☆39Updated last week
- Jupyter Notebooks for Cyber Threat Intelligence☆36Updated last year
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆18Updated last year
- Penguin OS Forensic (or Flight) Recorder☆39Updated 2 months ago
- VTC - Velociraptor Timeline Creator☆15Updated 9 months ago
- A MITRE ATT&CK Lookup Tool☆45Updated 10 months ago