fox-it / acquireLinks
acquire is a tool to quickly gather forensic artifacts from disk images or a live system into a lightweight container.
☆104Updated this week
Alternatives and similar repositories for acquire
Users that are interested in acquire are comparing it to the libraries listed below
Sorting:
- A python script developed to process Windows memory images based on triage type.☆262Updated last year
- Digital Forensics Artifacts Knowledge Base☆82Updated last year
- A GeoIP lookup utility utilizing ipinfo.io services.☆88Updated last year
- ☆8Updated 8 months ago
- Automagically extract forensic timeline from volatile memory dump☆131Updated last year
- This repository contains helper scripts and custom configs to get the best out of Google's Timesketch project.☆109Updated last year
- Repository of public reference frameworks for the DFIR community.☆116Updated last year
- macOS forensic timeline generator using the analysis result DBs of mac_apt☆94Updated last year
- Forensic Artifact Collection Tool Matrix☆85Updated 7 months ago
- A repo hosting the Markua content for the EZ Tools manuals hosted on Leanpub☆76Updated last year
- FJTA (Forensic Journal Timeline Analyzer) is a tool that analyzes Linux filesystem (ext4, XFS) journals (not systemd-journald logs), gene…☆75Updated this week
- MacOS forensic acquisition made simple☆159Updated 2 months ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆122Updated last year
- A toolkit for the post-mortem examination of Docker containers from forensic HDD copies☆103Updated last year
- Memory Baseliner is a script that can compare two windows memory images or perform frequency of occurrence / data stacking analysis on mu…☆54Updated last year
- 🧭 The artifactcollector is a customizable agent to collect forensic artifacts on any Windows, macOS or Linux system☆288Updated last month
- ☆68Updated 6 months ago
- Hunt malware with Volatility☆47Updated last year
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆155Updated 3 years ago
- Windows Forensics Environment Builder☆150Updated this week
- A curated list of KAPE-related resources☆169Updated last month
- BlackBerry Threat Research & Intelligence☆98Updated last year
- The Threat Actor Profile Guide for CTI Analysts☆107Updated last year
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆165Updated last year
- Incident Response documents and tooling☆74Updated last year
- Jupyter Notebooks for the Blue Team☆144Updated 3 months ago
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆318Updated last month
- A repo that contains recursive directory listings (using PowerShell) of a vanilla (clean) install of every Windows OS version to compare …☆163Updated 6 months ago
- DriveFS Sleuth is a Python tool that automates investigating Google Drive File Stream disk artifacts, the tool has been developed based o…☆82Updated 6 months ago
- Cast is an installer for any compatible Saltstack based distribution like SIFT or REMnux☆121Updated this week