fox-it / acquireLinks
acquire is a tool to quickly gather forensic artifacts from disk images or a live system into a lightweight container.
☆102Updated 2 weeks ago
Alternatives and similar repositories for acquire
Users that are interested in acquire are comparing it to the libraries listed below
Sorting:
- A python script developed to process Windows memory images based on triage type.☆262Updated last year
- Digital Forensics Artifacts Knowledge Base☆81Updated last year
- Windows Forensics Environment Builder☆145Updated this week
- A repo hosting the Markua content for the EZ Tools manuals hosted on Leanpub☆75Updated last year
- Memory Baseliner is a script that can compare two windows memory images or perform frequency of occurrence / data stacking analysis on mu…☆53Updated last year
- ☆7Updated 7 months ago
- This repository contains helper scripts and custom configs to get the best out of Google's Timesketch project.☆109Updated last year
- A toolkit for the post-mortem examination of Docker containers from forensic HDD copies☆101Updated last year
- macOS forensic timeline generator using the analysis result DBs of mac_apt☆94Updated last year
- BlackBerry Threat Research & Intelligence☆98Updated last year
- Repository of public reference frameworks for the DFIR community.☆116Updated last year
- A curated list of KAPE-related resources☆168Updated last month
- The Threat Actor Profile Guide for CTI Analysts☆107Updated last year
- ☆68Updated 5 months ago
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆165Updated last year
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆122Updated last year
- Incident Response documents and tooling☆74Updated last year
- A GeoIP lookup utility utilizing ipinfo.io services.☆87Updated last year
- ☆87Updated last year
- Forensic Artifact Collection Tool Matrix☆85Updated 6 months ago
- The Windows Malware Analysis Reversing Core Tools☆95Updated 4 years ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆155Updated last month
- Hunt malware with Volatility☆47Updated last year
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆95Updated 2 years ago
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆85Updated 3 months ago
- Automagically extract forensic timeline from volatile memory dump☆130Updated last year
- FJTA (Forensic Journal Timeline Analyzer) is a tool that analyzes Linux filesystem (EXT4, XFS) journals (not systemd-journald), generates…☆64Updated 2 months ago
- Python based tool to extract forensic info from EventTranscript.db (Windows Diagnostic Data)☆69Updated last year
- Harness the power of Splunk for your investigations☆107Updated 3 weeks ago
- Documentation site for Velociraptor☆46Updated last week