fox-it / acquire
acquire is a tool to quickly gather forensic artifacts from disk images or a live system into a lightweight container.
☆102Updated this week
Alternatives and similar repositories for acquire:
Users that are interested in acquire are comparing it to the libraries listed below
- A python script developed to process Windows memory images based on triage type.☆262Updated last year
- A repo hosting the Markua content for the EZ Tools manuals hosted on Leanpub☆72Updated last year
- Digital Forensics Artifacts Knowledge Base☆81Updated 11 months ago
- ☆6Updated 6 months ago
- This repository contains helper scripts and custom configs to get the best out of Google's Timesketch project.☆109Updated last year
- Windows Forensics Environment Builder☆135Updated 4 months ago
- A curated list of KAPE-related resources☆166Updated last week
- macOS forensic timeline generator using the analysis result DBs of mac_apt☆93Updated last year
- A toolkit for the post-mortem examination of Docker containers from forensic HDD copies☆99Updated last year
- Forensic Artifact Collection Tool Matrix☆84Updated 6 months ago
- ☆68Updated 4 months ago
- Logbook for Digital Forensics and Incident Response☆50Updated 9 months ago
- Repository of public reference frameworks for the DFIR community.☆116Updated last year
- A repo that contains recursive directory listings (using PowerShell) of a vanilla (clean) install of every Windows OS version to compare …☆160Updated 5 months ago
- Remote access and Antivirus Logging Database☆42Updated last year
- A GeoIP lookup utility utilizing ipinfo.io services.☆87Updated last year
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆122Updated last year
- Memory Baseliner is a script that can compare two windows memory images or perform frequency of occurrence / data stacking analysis on mu…☆53Updated last year
- Convert a variety of log formats to CSV while enriching detected IPs with Geolocation, ASN, DNS, WhoIs, Shodan InternetDB and Threat Indi…☆103Updated 6 months ago
- BlackBerry Threat Research & Intelligence☆98Updated last year
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆84Updated 3 months ago
- The Threat Actor Profile Guide for CTI Analysts☆106Updated last year
- ☆51Updated this week
- Hunt malware with Volatility☆47Updated last year
- Incident Response documents and tooling☆72Updated last year
- A PowerShell incident response script for quick triage☆80Updated 2 years ago
- DriveFS Sleuth is a Python tool that automates investigating Google Drive File Stream disk artifacts, the tool has been developed based o…☆80Updated 4 months ago
- Collection of scripts provided for public use☆34Updated 2 weeks ago
- ☆68Updated 2 months ago
- 🧭 The artifactcollector is a customizable agent to collect forensic artifacts on any Windows, macOS or Linux system☆286Updated 3 months ago