Documentation for the GRR Rapid Reponse framework
☆310Feb 18, 2026Updated 2 weeks ago
Alternatives and similar repositories for grr-doc
Users that are interested in grr-doc are comparing it to the libraries listed below
Sorting:
- GRR Rapid Response: remote live forensics for incident response☆5,041Feb 16, 2026Updated 2 weeks ago
- Rekall Memory Forensic Framework☆1,997Oct 18, 2020Updated 5 years ago
- Discover potential timestamps within the Windows Registry☆19Apr 22, 2014Updated 11 years ago
- A system call tracer☆10Sep 22, 2014Updated 11 years ago
- Malware monitor template based on MinHook☆17Mar 29, 2015Updated 10 years ago
- Frontend for Codex Gigas☆21Mar 6, 2017Updated 8 years ago
- Threat Analysis, Reconnaissance, and Data Intelligence System☆129Aug 28, 2015Updated 10 years ago
- Tools for the Computer Incident Response Team☆150Apr 17, 2017Updated 8 years ago
- Remote execution tool☆14Jan 14, 2014Updated 12 years ago
- CRITs - Collaborative Research Into Threats☆910Jul 29, 2019Updated 6 years ago
- Incident Response Forensic Framework☆612Nov 20, 2019Updated 6 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- Simple Shellcode development/injection on macOS☆11Nov 6, 2017Updated 8 years ago
- Collaborative forensic timeline analysis☆3,271Feb 23, 2026Updated last week
- A tool to retrieve malware directly from the source for security researchers.☆563Jul 27, 2017Updated 8 years ago
- Imports Alienvault OTX pulses to a MISP instance☆53Sep 29, 2021Updated 4 years ago
- Fast Incident Response☆1,995Feb 17, 2026Updated 2 weeks ago
- Super timeline all the things☆2,017Feb 10, 2026Updated 3 weeks ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆20Oct 24, 2018Updated 7 years ago
- ☆519Jan 26, 2021Updated 5 years ago
- DNS TCP to UDP proxy☆10Jul 19, 2015Updated 10 years ago
- Framework for vulnerability fuzzing and reverse-engineering tool development.☆23Jul 25, 2023Updated 2 years ago
- SIFT Bootstrap Script☆145Jun 20, 2017Updated 8 years ago
- DPS' Lightweight Investigation Notebook☆433Dec 31, 2023Updated 2 years ago
- Public Profile Repository for Rekall Memory Forensic.☆101Oct 20, 2020Updated 5 years ago
- API logger plugin for Intel Pintool☆14Nov 19, 2017Updated 8 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆439Feb 24, 2023Updated 3 years ago
- Hidden monitoring and blocking Android apps☆10May 2, 2017Updated 8 years ago
- Sandia Cyber Omni Tracker (SCOT)☆253Nov 4, 2024Updated last year
- An informational repo about hunting for adversaries in your IT environment.☆1,854Nov 17, 2021Updated 4 years ago
- Python tools for IOC (Indicator of Compromise) handling☆96Nov 25, 2021Updated 4 years ago
- Python unbup script for McAfee .bup files (with some additional fun features). This script is fully implemented in python it's not just a…☆37Apr 24, 2018Updated 7 years ago
- ☆816May 24, 2017Updated 8 years ago
- An information security preparedness tool to do adversarial simulation.☆1,139Apr 1, 2019Updated 6 years ago
- A Simple QUEry and Report Tool☆142Sep 17, 2019Updated 6 years ago
- Security Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management☆3,106Apr 16, 2021Updated 4 years ago
- PowerShell script utilized to pull several forensic artifacts from a live Win7 and WinXP system without WINRM.☆51Jan 25, 2018Updated 8 years ago
- Python IOC Editor☆65Mar 10, 2015Updated 10 years ago
- FireEye Publicly Shared Indicators of Compromise (IOCs)☆473Jan 19, 2019Updated 7 years ago