fox-it / acquire
acquire is a tool to quickly gather forensic artifacts from disk images or a live system into a lightweight container.
☆94Updated this week
Alternatives and similar repositories for acquire:
Users that are interested in acquire are comparing it to the libraries listed below
- Digital Forensics Artifacts Knowledge Base☆77Updated 9 months ago
- This repository contains helper scripts and custom configs to get the best out of Google's Timesketch project.☆106Updated last year
- Logbook for Digital Forensics and Incident Response☆50Updated 7 months ago
- ☆5Updated 3 months ago
- Forensic Artifact Collection Tool Matrix☆82Updated 3 months ago
- A repo hosting the Markua content for the EZ Tools manuals hosted on Leanpub☆65Updated last year
- Remote access and Antivirus Logging Database☆43Updated 9 months ago
- Incident Response documents and tooling☆68Updated last year
- A curated list of KAPE-related resources☆162Updated 9 months ago
- Windows Forensics Environment Builder☆129Updated last month
- BlackBerry Threat Research & Intelligence☆97Updated last year
- Memory Baseliner is a script that can compare two windows memory images or perform frequency of occurrence / data stacking analysis on mu…☆51Updated last year
- Repository of public reference frameworks for the DFIR community.☆115Updated last year
- Python based tool to extract forensic info from EventTranscript.db (Windows Diagnostic Data)☆68Updated last year
- macOS forensic timeline generator using the analysis result DBs of mac_apt☆91Updated last year
- ☆66Updated 2 months ago
- The Threat Actor Profile Guide for CTI Analysts☆104Updated last year
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆116Updated last year
- Collection of scripts provided for public use☆34Updated 3 months ago
- DriveFS Sleuth is a Python tool that automates investigating Google Drive File Stream disk artifacts, the tool has been developed based o…☆77Updated 2 months ago
- A python script developed to process Windows memory images based on triage type.☆260Updated last year
- Convert a variety of log formats to CSV while enriching detected IPs with Geolocation, ASN, DNS, WhoIs, Shodan InternetDB and Threat Indi…☆102Updated 4 months ago
- ☆86Updated last year
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆84Updated last week
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆151Updated 9 months ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆85Updated 2 years ago
- Rules shared by the community from 100 Days of YARA 2024☆83Updated last month
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆74Updated this week
- A GeoIP lookup utility utilizing ipinfo.io services.☆84Updated last year
- Automagically extract forensic timeline from volatile memory dump☆126Updated 9 months ago