google / docker-explorer
A tool to help forensicate offline docker acquisitions
☆534Updated 4 months ago
Alternatives and similar repositories for docker-explorer:
Users that are interested in docker-explorer are comparing it to the libraries listed below
- (DEPRECATED) Diffy is a triage tool used during cloud-centric security incidents, to help digital forensics and incident response (DFIR)…☆633Updated last year
- A repository for using osquery for incident detection and response☆837Updated 2 years ago
- A container analysis and exploitation tool for pentesters and engineers.☆660Updated last year
- A Linux Auditd rule set mapped to MITRE's Attack Framework☆780Updated 4 years ago
- An open source framework for enterprise level automated analysis.☆395Updated 2 years ago
- Automation and Scaling of Digital Forensics Tools☆758Updated last week
- an osquery fleet manager☆619Updated 2 years ago
- Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.☆1,285Updated 2 years ago
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆535Updated 11 months ago
- Remote Memory Acquisition Tool☆245Updated 4 years ago
- Python library to carry out DFIR analysis on the Cloud☆471Updated last month
- Python installable command line utiltity for mitigation of host and key compromises.☆344Updated 3 years ago
- osquery extensions by Trail of Bits☆264Updated last year
- A production-friendly malware scanner for your AWS cloud☆199Updated 3 years ago
- A framework for orchestrating forensic collection, processing and data export☆305Updated this week
- 16,432 Free Yara rules created by☆381Updated 5 years ago
- Collect, Process, and Hunt with host based data from MacOS, Windows, and Linux☆498Updated 2 years ago
- Lookyloo is a web interface that allows users to capture a website page and then display a tree of domains that call each other.☆699Updated this week
- FAME Automates Malware Evaluation☆878Updated last week
- Builds malware analysis Windows VMs so that you don't have to.☆1,041Updated 3 years ago
- DFIRTrack - The Incident Response Tracking Application☆491Updated 5 months ago
- Production-ready detection & response queries for osquery☆543Updated this week
- The Cold Disk Quick Response (CDQR) tool is a fast and easy to use forensic artifact parsing tool that works on disk images, mounted driv…☆336Updated 2 years ago
- Automated deployment scripts for the RockNSM network hunting distribution.☆449Updated last year
- Documenting your Threat Models with HCL☆421Updated 5 months ago
- Mapping the MITRE ATT&CK Matrix with Osquery☆787Updated last year
- File Scanning Framework☆290Updated 3 years ago
- Chain Reactor is an open source framework for composing executables that simulate adversary behaviors and techniques on Linux endpoints.☆300Updated 3 months ago
- An information security preparedness tool to do adversarial simulation.☆1,113Updated 5 years ago
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆254Updated 3 months ago