dfrws / dfrws2023-challengeLinks
The DFRWS 2023 challenge (The Troubled Elevator) takes a deep dive into the domain of Industrial Control Systems (ICS), specifically focusing on programmable logic controllers (PLC). This challenge aims to provide deeper insights into ICS network traffic analysis and device memory in a real-world scenario.
☆58Updated last year
Alternatives and similar repositories for dfrws2023-challenge
Users that are interested in dfrws2023-challenge are comparing it to the libraries listed below
Sorting:
- Rules Shared by the Community from 100 Days of YARA 2023☆78Updated 2 years ago
- A specification and style guide for YARA rules☆65Updated last year
- A toolkit for the post-mortem examination of Docker containers from forensic HDD copies☆107Updated last year
- Rules shared by the community from 100 Days of YARA 2024☆88Updated last year
- Detection Engineering with YARA☆86Updated 2 years ago
- BlackBerry Threat Research & Intelligence☆100Updated 2 years ago
- Forensic Artifact Collection Tool Matrix☆92Updated last year
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆97Updated 2 years ago
- Xavier Framework is a user interface wrapper built on top of the Volatility(c) memory forensics framework.☆46Updated 3 years ago
- JPCERT/CC public YARA rules repository☆110Updated 2 months ago
- acquire is a tool to quickly gather forensic artifacts from disk images or a live system into a lightweight container.☆115Updated last week
- ☆68Updated 2 months ago
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆66Updated last year
- Volatility3 plugins developed and maintained by the community☆61Updated 2 years ago
- A forensic open-source parser module for Autopsy that allows extracting the messages, comments, posts, contacts, calendar entries and rea…☆114Updated last week
- The SOLVE-IT knowledge base for digital forensics☆59Updated last week
- Algorithme d'apprentissage statistique permettant de créer un modèle sur les lignes de commandes des évènements "Création de Processus", …☆83Updated last year
- Contains compiled binaries of Volatility☆37Updated 8 months ago
- FJTA (Forensic Journal Timeline Analyzer) is a tool that analyzes Linux filesystem (ext4, XFS) journals (not systemd-journald logs), gene…☆103Updated 2 weeks ago
- ☆101Updated last month
- macOS Artifacts☆33Updated 10 months ago
- The Linux DFIR Collector is a stand-alone collection tool for Gnu / Linux. Dump artifacts in json format with very few impacts on the hos…☆32Updated 3 years ago
- Python based tool to extract forensic info from EventTranscript.db (Windows Diagnostic Data)☆68Updated 2 years ago
- The backend server handling API requests and task management☆55Updated last week
- FLARE floss applied to all unpacked+dumped samples in Malpedia, pre-processed for further use.☆70Updated 3 weeks ago
- A YARA & Malware Analysis Toolkit written in Rust.☆90Updated 3 months ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆34Updated 7 months ago
- macOS forensic timeline generator using the analysis result DBs of mac_apt☆92Updated 2 years ago
- YARA rule analyzer to improve rule quality and performance☆109Updated last week
- A Windows Event Log MCP☆38Updated 5 months ago