google / docker-explorer
A tool to help forensicate offline docker acquisitions
☆530Updated last month
Alternatives and similar repositories for docker-explorer:
Users that are interested in docker-explorer are comparing it to the libraries listed below
- Python library to carry out DFIR analysis on the Cloud☆466Updated last month
- (DEPRECATED) Diffy is a triage tool used during cloud-centric security incidents, to help digital forensics and incident response (DFIR)…☆635Updated 10 months ago
- A repository for using osquery for incident detection and response☆829Updated 2 years ago
- Real-time, container-based file scanning at enterprise scale☆884Updated last week
- an osquery fleet manager☆620Updated last year
- Automation and Scaling of Digital Forensics Tools☆750Updated this week
- A Linux Auditd rule set mapped to MITRE's Attack Framework☆777Updated 4 years ago
- A framework for orchestrating forensic collection, processing and data export☆296Updated 2 weeks ago
- Python installable command line utiltity for mitigation of host and key compromises.☆344Updated 3 years ago
- Collect, Process, and Hunt with host based data from MacOS, Windows, and Linux☆491Updated 2 years ago
- Remote Memory Acquisition Tool☆242Updated 4 years ago
- FAME Automates Malware Evaluation☆863Updated 2 weeks ago
- Fast and efficient osquery management☆395Updated 2 weeks ago
- The main project for the Unfetter-Discover application. This is the project that will hold the configuration files, the docker-compose f…☆409Updated last year
- An information security preparedness tool to do adversarial simulation.☆1,102Updated 5 years ago
- DFIRTrack - The Incident Response Tracking Application☆482Updated 2 months ago
- Mapping the MITRE ATT&CK Matrix with Osquery☆777Updated last year
- Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.☆1,272Updated last year
- Chain Reactor is an open source framework for composing executables that simulate adversary behaviors and techniques on Linux endpoints.☆296Updated 3 weeks ago
- A UNIX security auditing tool based on several security frameworks☆309Updated 4 months ago
- dockscan is security vulnerability and audit scanner for Docker installations☆218Updated 8 years ago
- AutoMacTC: Automated Mac Forensic Triage Collector☆534Updated 2 years ago
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆533Updated 8 months ago
- 1-Click push forensics evidence to the cloud☆140Updated 5 months ago
- Lookyloo is a web interface that allows users to capture a website page and then display a tree of domains that call each other.☆684Updated this week
- osquery extensions by Trail of Bits☆263Updated last year
- CRITs - Collaborative Research Into Threats☆892Updated 5 years ago
- A Python package to interact with the Mitre ATT&CK Framework☆468Updated last year
- Script for automating Linux memory capture and analysis☆266Updated 4 years ago
- Yet Another Yara Automaton - Automatically curate open source yara rules and run scans☆268Updated 11 months ago