docker-forensics-toolkit / toolkitLinks
A toolkit for the post-mortem examination of Docker containers from forensic HDD copies
☆107Updated last year
Alternatives and similar repositories for toolkit
Users that are interested in toolkit are comparing it to the libraries listed below
Sorting:
- Forensic Artifact Collection Tool Matrix☆92Updated last year
- The Linux DFIR Collector is a stand-alone collection tool for Gnu / Linux. Dump artifacts in json format with very few impacts on the hos…☆32Updated 3 years ago
- BlackBerry Threat Research & Intelligence☆100Updated 2 years ago
- Automagically extract forensic timeline from volatile memory dump☆132Updated last year
- A GeoIP lookup utility utilizing ipinfo.io services.☆93Updated 2 years ago
- acquire is a tool to quickly gather forensic artifacts from disk images or a live system into a lightweight container.☆116Updated 2 weeks ago
- ☆92Updated 6 months ago
- ☆68Updated 2 months ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Updated 3 years ago
- Digital Forensics Artifacts Knowledge Base☆89Updated last month
- A python script developed to process Windows memory images based on triage type.☆263Updated 2 years ago
- ☆78Updated 4 months ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆119Updated 2 years ago
- The backend server handling API requests and task management☆55Updated last week
- Repository of public reference frameworks for the DFIR community.☆121Updated 2 years ago
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆97Updated 2 years ago
- A curated list of KAPE-related resources☆177Updated 9 months ago
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆69Updated last year
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆66Updated 3 years ago
- Open Threat Hunting Framework☆123Updated 2 years ago
- Fast IOC and YARA Scanner☆88Updated 5 years ago
- Cyber Underground General Intelligence Requirements☆97Updated 2 years ago
- JPCERT/CC public YARA rules repository☆110Updated 2 months ago
- A script to collect (the most famous) Yara rules from more than 150 free resources. Free alternative to: https://valhalla.nextron-system…☆28Updated 2 years ago
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆117Updated 2 years ago
- The Threat Actor Profile Guide for CTI Analysts☆116Updated 2 years ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆127Updated 2 years ago
- Blueteam operational triage registry hunting/forensic tool.☆149Updated 5 months ago
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆78Updated last week
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆56Updated 4 years ago