fox-it / acquire
acquire is a tool to quickly gather forensic artifacts from disk images or a live system into a lightweight container.
☆97Updated last week
Alternatives and similar repositories for acquire:
Users that are interested in acquire are comparing it to the libraries listed below
- A repo hosting the Markua content for the EZ Tools manuals hosted on Leanpub☆67Updated last year
- Digital Forensics Artifacts Knowledge Base☆79Updated 10 months ago
- A toolkit for the post-mortem examination of Docker containers from forensic HDD copies☆98Updated last year
- ☆5Updated 4 months ago
- This repository contains helper scripts and custom configs to get the best out of Google's Timesketch project.☆107Updated last year
- A python script developed to process Windows memory images based on triage type.☆261Updated last year
- A curated list of KAPE-related resources☆163Updated 10 months ago
- Repository of public reference frameworks for the DFIR community.☆115Updated last year
- Windows Forensics Environment Builder☆131Updated 2 months ago
- Forensic Artifact Collection Tool Matrix☆83Updated 4 months ago
- ☆67Updated 3 months ago
- Memory Baseliner is a script that can compare two windows memory images or perform frequency of occurrence / data stacking analysis on mu…☆52Updated last year
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆279Updated 7 months ago
- 🧭 The artifactcollector is a customizable agent to collect forensic artifacts on any Windows, macOS or Linux system☆281Updated last month
- Hunt malware with Volatility☆47Updated 10 months ago
- macOS forensic timeline generator using the analysis result DBs of mac_apt☆92Updated last year
- YARA rule analyzer to improve rule quality and performance☆97Updated 3 months ago
- A GeoIP lookup utility utilizing ipinfo.io services.☆84Updated last year
- Remote access and Antivirus Logging Database☆42Updated 10 months ago
- Logbook for Digital Forensics and Incident Response☆50Updated 8 months ago
- The Threat Actor Profile Guide for CTI Analysts☆107Updated last year
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆118Updated last year
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆84Updated last month
- Automagically extract forensic timeline from volatile memory dump☆128Updated 10 months ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆155Updated 2 years ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆153Updated 10 months ago
- A repo that contains recursive directory listings (using PowerShell) of a vanilla (clean) install of every Windows OS version to compare …☆154Updated 3 months ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆111Updated last year
- ☆67Updated 3 weeks ago