google / turbinia
Automation and Scaling of Digital Forensics Tools
☆765Updated 2 months ago
Alternatives and similar repositories for turbinia
Users that are interested in turbinia are comparing it to the libraries listed below
Sorting:
- A framework for orchestrating forensic collection, processing and data export☆313Updated last week
- Digital Forensics artifact repository☆1,112Updated 4 months ago
- Python library to carry out DFIR analysis on the Cloud☆477Updated last month
- Digital Forensics Investigation Platform☆819Updated 7 months ago
- AutoMacTC: Automated Mac Forensic Triage Collector☆540Updated 3 years ago
- DFIRTrack - The Incident Response Tracking Application☆498Updated 8 months ago
- Repository of YARA rules made by Trellix ATR Team☆595Updated last month
- Extract and aggregate threat intelligence.☆863Updated last year
- A knowledge base of actionable Incident Response techniques☆636Updated 2 years ago
- Collect, Process, and Hunt with host based data from MacOS, Windows, and Linux☆500Updated 2 years ago
- Online hash checker for Virustotal and other services☆825Updated last month
- Mapping the MITRE ATT&CK Matrix with Osquery☆793Updated 2 years ago
- Real-time, container-based file scanning at enterprise scale☆919Updated 3 weeks ago
- An open source framework for enterprise level automated analysis.☆396Updated 2 years ago
- File Scanning Framework☆292Updated 3 years ago
- SIFT☆504Updated last year
- A Python package to interact with the Mitre ATT&CK Framework☆477Updated last year
- FAME Automates Malware Evaluation☆895Updated 3 weeks ago
- ReversingLabs YARA Rules☆817Updated last month
- CyLR - Live Response Collection Tool☆677Updated 2 years ago
- Documentation of TheHive☆397Updated last year
- Kaspersky's GReAT KLara☆708Updated 9 months ago
- A set of Zeek scripts to detect ATT&CK techniques.☆587Updated 10 months ago
- CRITs - Collaborative Research Into Threats☆901Updated 5 years ago
- A collection of sources of indicators of compromise.☆855Updated 7 months ago
- IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.☆1,036Updated this week
- A Splunk app mapped to MITRE ATT&CK to guide your threat hunts☆1,156Updated last year
- MISP trainings, threat intel and information sharing training materials with source code☆407Updated last week
- Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.☆1,303Updated 2 years ago
- CLI tool to manage a SIFT Install☆419Updated 2 years ago