diogo-fernan / ir-rescueView external linksLinks
A Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.
☆487Feb 21, 2021Updated 4 years ago
Alternatives and similar repositories for ir-rescue
Users that are interested in ir-rescue are comparing it to the libraries listed below
Sorting:
- The Cold Disk Quick Response (CDQR) tool is a fast and easy to use forensic artifact parsing tool that works on disk images, mounted driv…☆345Jun 25, 2022Updated 3 years ago
- PowerForensics provides an all in one platform for live disk forensic analysis☆1,427Nov 16, 2023Updated 2 years ago
- A Powershell incident response framework☆1,639Nov 22, 2022Updated 3 years ago
- CimSweep is a suite of CIM/WMI-based tools that enable the ability to perform incident response and hunting operations remotely across al…☆657Aug 19, 2019Updated 6 years ago
- A collection of PowerShell modules designed for artifact gathering and reconnaisance of Windows-based endpoints.☆481Nov 15, 2024Updated last year
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,135Oct 19, 2025Updated 3 months ago
- CyLR - Live Response Collection Tool☆708Jun 1, 2022Updated 3 years ago
- Collect, Process, and Hunt with host based data from MacOS, Windows, and Linux☆504Oct 21, 2022Updated 3 years ago
- Invoke-LiveResponse☆150Feb 22, 2022Updated 3 years ago
- ☆519Jan 26, 2021Updated 5 years ago
- Utilities for Sysmon☆1,571Sep 21, 2025Updated 4 months ago
- PSRecon gathers data from a remote Windows host using PowerShell (v2 or later), organizes the data into folders, hashes all extracted da…☆491Jul 29, 2017Updated 8 years ago
- Loki - Simple IOC and YARA Scanner☆3,719Jan 12, 2026Updated last month
- A curated list of tools for incident response☆8,808Jul 18, 2024Updated last year
- IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.☆1,107Dec 2, 2025Updated 2 months ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,475Jan 12, 2026Updated last month
- Sources, configuration and how to detect evil things utilizing Microsoft Sysmon.☆937Dec 12, 2023Updated 2 years ago
- Digital forensic acquisition tool for Windows based incident response.☆346May 7, 2024Updated last year
- Exploit the credentials present in files and memory☆845May 25, 2023Updated 2 years ago
- Tools for the Computer Incident Response Team☆150Apr 17, 2017Updated 8 years ago
- Allows you to quickly query a Windows machine for RAM artifacts☆218Jul 17, 2020Updated 5 years ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,710Sep 23, 2025Updated 4 months ago
- Digital Forensics artifact repository☆1,204Feb 11, 2026Updated last week
- Windows Events Attack Samples☆2,507Jan 24, 2023Updated 3 years ago
- A Python RESTful API framework for online malware analysis and threat intelligence services.☆369May 21, 2024Updated last year
- ☆453Nov 21, 2024Updated last year
- ☆349Mar 19, 2021Updated 4 years ago
- Scripts and code referenced in CrowdStrike blog posts☆336Nov 13, 2019Updated 6 years ago
- AutoMacTC: Automated Mac Forensic Triage Collector☆553Mar 31, 2022Updated 3 years ago
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆410Apr 21, 2020Updated 5 years ago
- FAME Automates Malware Evaluation☆927Dec 16, 2025Updated 2 months ago
- An information security preparedness tool to do adversarial simulation.☆1,142Apr 1, 2019Updated 6 years ago
- Modular file scanning/analysis framework☆621Oct 8, 2019Updated 6 years ago
- Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.☆1,339Dec 13, 2022Updated 3 years ago
- VolatilityBot – An automated memory analyzer for malware samples and memory dumps☆270Jun 15, 2021Updated 4 years ago
- ☆2,383Oct 14, 2023Updated 2 years ago
- Windows Live Artifacts Acquisition Script☆190Jun 20, 2022Updated 3 years ago
- DPS' Lightweight Investigation Notebook☆433Dec 31, 2023Updated 2 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,313Jan 22, 2025Updated last year