forensicanalysis / artifactcollector
๐งญ The artifactcollector is a customizable agent to collect forensic artifacts on any Windows, macOS or Linux system
โ274Updated 2 months ago
Alternatives and similar repositories for artifactcollector:
Users that are interested in artifactcollector are comparing it to the libraries listed below
- A python script developed to process Windows memory images based on triage type.โ260Updated last year
- Rules generated from our investigations.โ188Updated 2 months ago
- Live forensic artifacts collectorโ162Updated 6 months ago
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.โ274Updated 4 months ago
- Automated YARA Rule Standardization and Quality Assurance Toolโ179Updated this week
- A framework for orchestrating forensic collection, processing and data exportโ303Updated this week
- The goal of this repo is to archive artifacts from all versions of various OS's and categorizing them by type. This will help with artifaโฆโ569Updated 2 months ago
- This script is made to collect the most valiable artifacts for foreniscs or incident reponse investigation rather than imaging the whole โฆโ195Updated 4 years ago
- A curated list of KAPE-related resourcesโ159Updated 8 months ago
- Signatures and IoCs from public Volexity blog posts.โ344Updated last month
- Collection of Event ID ressources useful for Digital Forensics and Incident Responseโ597Updated 6 months ago
- an excel-centric approach for the MITRE ATT&CKยฎ Tactics and Techniquesโ181Updated 2 years ago
- A repository of DFIR-related Mind Maps geared towards the visual learners!โ517Updated 2 years ago
- The Volatility Collaborative GUIโ230Updated this week
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logsโ688Updated 2 weeks ago
- Digital Forensics Artifacts Knowledge Baseโ76Updated 8 months ago
- SIEGMA - Transform Sigma rules into SIEM consumablesโ146Updated last year
- A repo that contains recursive directory listings (using PowerShell) of a vanilla (clean) install of every Windows OS version to compare โฆโ150Updated last month
- Curated Windows event log Sigma rules used in Hayabusa and Velociraptor.โ149Updated this week
- Set of EVTX samples (>270) mapped to MITRE ATT&CK tactic and techniques to measure your SIEM coverage or developed new use cases.โ537Updated this week
- Detection Ideas & Rules repository.โ178Updated 3 years ago
- Threat Hunting tool about Sysmon and graphsโ329Updated last year
- A toolkit for the post-mortem examination of Docker containers from forensic HDD copiesโ97Updated 11 months ago
- Open Source Platform for storing, organizing, and searching documents related to cyber threatsโ159Updated last year
- Sigma rules from Joe Securityโ202Updated 2 months ago
- Docker image for Velocidex Velociraptorโ115Updated 6 months ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntinโฆโ154Updated 2 years ago
- This repository contains helper scripts and custom configs to get the best out of Google's Timesketch project.โ101Updated last year
- โ63Updated last month