forensicanalysis / artifactcollector
๐งญ The artifactcollector is a customizable agent to collect forensic artifacts on any Windows, macOS or Linux system
โ286Updated 3 months ago
Alternatives and similar repositories for artifactcollector:
Users that are interested in artifactcollector are comparing it to the libraries listed below
- A python script developed to process Windows memory images based on triage type.โ262Updated last year
- A framework for orchestrating forensic collection, processing and data exportโ311Updated last week
- The goal of this repo is to archive artifacts from all versions of various OS's and categorizing them by type. This will help with artifaโฆโ597Updated last month
- Collection of Event ID ressources useful for Digital Forensics and Incident Responseโ612Updated 10 months ago
- Curated Windows event log Sigma rules used in Hayabusa and Velociraptor.โ172Updated this week
- A curated list of KAPE-related resourcesโ166Updated last week
- Rules generated from our investigations.โ194Updated last month
- Live forensic artifacts collectorโ166Updated 10 months ago
- Repository of attack and defensive information for Business Email Compromise investigationsโ251Updated 3 months ago
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logsโ710Updated last month
- This script is made to collect the most valiable artifacts for foreniscs or incident reponse investigation rather than imaging the whole โฆโ200Updated 4 years ago
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.โ285Updated 8 months ago
- The Volatility Collaborative GUIโ242Updated last week
- โ201Updated last year
- Docker image for Velocidex Velociraptorโ126Updated 2 months ago
- Open Source Platform for storing, organizing, and searching documents related to cyber threatsโ165Updated last year
- Repository of public reference frameworks for the DFIR community.โ116Updated last year
- Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniquesโ132Updated last year
- Threat Hunting tool about Sysmon and graphsโ332Updated last year
- A repository of DFIR-related Mind Maps geared towards the visual learners!โ522Updated 2 years ago
- acquire is a tool to quickly gather forensic artifacts from disk images or a live system into a lightweight container.โ102Updated 3 weeks ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.โ202Updated 2 years ago
- Set of EVTX samples (>270) mapped to MITRE ATT&CK tactic and techniques to measure your SIEM coverage or developed new use cases.โ566Updated 3 months ago
- Automated YARA Rule Standardization and Quality Assurance Toolโ214Updated last week
- Set of SIGMA rules (>350) mapped to MITRE ATT&CK tactic and techniquesโ357Updated 3 months ago
- Sigma rules from Joe Securityโ209Updated 6 months ago
- SIEGMA - Transform Sigma rules into SIEM consumablesโ149Updated last month
- โ515Updated 7 months ago
- an excel-centric approach for the MITRE ATT&CKยฎ Tactics and Techniquesโ185Updated 3 years ago
- DFIRTrack - The Incident Response Tracking Applicationโ498Updated 8 months ago