ezaspy / elrond
Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.
☆32Updated last month
Alternatives and similar repositories for elrond:
Users that are interested in elrond are comparing it to the libraries listed below
- A sample VHDX file with multiple verbose examples of forensic and anti-forensics artifacts. Meant to be basic and can be expanded upon. P…☆25Updated 2 years ago
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Updated 2 years ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆32Updated 2 months ago
- ☆41Updated 9 months ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Updated 2 years ago
- A repository containing the research output from my GCFE Gold Paper which compared Windows 10 and Windows 11.☆26Updated 2 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆23Updated this week
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- Logbook for Digital Forensics and Incident Response☆50Updated 6 months ago
- VTC - Velociraptor Timeline Creator☆15Updated 8 months ago
- Threat Box Assessment Tool☆19Updated 3 years ago
- Penguin OS Forensic (or Flight) Recorder☆38Updated last month
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆18Updated last year
- Scripts to for ready-to-use Velociraptor instance deployment in Azure☆13Updated last year
- ESXi Cyber Security Incident Response Script☆22Updated 4 months ago
- Converts Sigma detection rules to a Splunk alert configuration.☆13Updated 3 years ago
- ☆19Updated last year
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 3 years ago
- CSIRT Jump Bag☆27Updated 9 months ago
- Scripts and lists to help generate YARA friendly string mutations☆19Updated last year
- ☆27Updated 3 weeks ago
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 3 years ago
- ReWrite of AChoir in Go for Cross Platform☆37Updated last month
- Random tips and tricks RE: ransomware☆14Updated 3 years ago
- Cumulonimbus-UAL_Extractor is a PowerShell based tool created by the Tesorion CERT team to help gather the Unified Audit Logging out of a…☆19Updated last year
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆36Updated last year
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆64Updated 11 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆50Updated last month
- ☆10Updated 5 months ago