dod-cyber-crime-center / Digital-Crime-Scene-ChallengeLinks
The object of the Digital Crime Scene Challenge is for participants to use their forensic and investigative skills to focus on potential digital evidence and conduct triage/analysis of such evidence.
☆39Updated 12 years ago
Alternatives and similar repositories for Digital-Crime-Scene-Challenge
Users that are interested in Digital-Crime-Scene-Challenge are comparing it to the libraries listed below
Sorting:
- Converting data from services like Censys and Shodan to a common data model☆50Updated 3 months ago
- A simple many-rules to many-files YARA scanner for incident response or malware zoos.☆26Updated 7 years ago
- Home to the ActorTrackr source code☆29Updated 8 years ago
- Malquarium - Modern Malware Repository☆47Updated last week
- Scripts to analyze stuff☆146Updated 2 months ago
- CARET - A tool for viewing cyber analytic relationships☆55Updated 5 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆42Updated 2 years ago
- isodump - ISO dump utility☆41Updated 6 years ago
- A DFVFS Backed Forensic Viewer☆40Updated 5 years ago
- ForGe Forensic test image generator☆34Updated 10 years ago
- Various capabilities for static malware analysis.☆79Updated last year
- Remote / Onsite Security Assessment Jumpkit☆39Updated 2 years ago
- Deploy MISP Project software with Vagrant.☆45Updated 5 years ago
- A collection of typical false positive indicators☆55Updated 4 years ago
- Tools and script for my remnux/sift installation☆25Updated 2 months ago
- DeployREMnux is a Python script that will deploy a cloud instance of the public REMnux distribution in the Amazon cloud (AWS).☆16Updated 5 years ago
- Synopsis is a tool to aid analysts reviewing browser history files by providing a high-level “synopsis” of key information.☆21Updated 6 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆103Updated 3 months ago
- Identifies physical locations where a laptop has been based upon wireless profiles and wireless data recorded in event logs☆94Updated 4 years ago
- Malware similarity platform with modularity in mind.☆78Updated 4 years ago
- Tool for automatic list generation of known TOR and VPN exit nodes☆29Updated last year
- evtx2json extracts events of interest from event logs, dedups them, and exports them to json.☆42Updated 4 years ago
- mindmap created for tools can be used during analysis/investigation☆27Updated 8 years ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆60Updated 4 months ago
- A curated list of malware repositories, trackers and malware analysis tools☆87Updated 2 years ago
- ☆54Updated 5 years ago
- Fast incident overview☆40Updated 8 years ago
- Collection of scripts used to analyse malware or emails☆20Updated 5 years ago
- ☆52Updated 7 years ago
- Standardized Malware Analysis Tool☆55Updated 4 years ago