Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer
☆41Jul 29, 2020Updated 5 years ago
Alternatives and similar repositories for FECT
Users that are interested in FECT are comparing it to the libraries listed below
Sorting:
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Oct 18, 2016Updated 9 years ago
- Random scripts for log mining, intel gathering, network querying, and other incident response-ish activities☆16Sep 13, 2022Updated 3 years ago
- Maltego Transform to put entities into MISP events☆28Jul 24, 2021Updated 4 years ago
- Some IR notes☆73Jul 23, 2016Updated 9 years ago
- Tools for the Computer Incident Response Team☆150Apr 17, 2017Updated 8 years ago
- A DFVFS Backed Forensic Viewer☆42Apr 13, 2020Updated 5 years ago
- Queries to parse sysmon event log file with microsoft logparser☆58Mar 31, 2015Updated 10 years ago
- ☆11Oct 16, 2022Updated 3 years ago
- Visualize your CRITs IOC's in Maltego☆12Jan 13, 2015Updated 11 years ago
- Windows Live Artifacts Acquisition Script☆190Jun 20, 2022Updated 3 years ago
- InternetOff turns access to the Internet off and on again, without affecting access to the local network. It is a small program that work…☆13Jan 1, 2020Updated 6 years ago
- threat language parser☆59Apr 20, 2015Updated 10 years ago
- Web App for Volatility framework☆390Jan 13, 2026Updated 2 months ago
- Static analysis tools for Microsoft Office Open XML files and documents☆73Oct 13, 2017Updated 8 years ago
- set of entities for Maltego including common STIX objects and several flavors of kill chain.☆11May 6, 2015Updated 10 years ago
- Passive DNS V2☆60Mar 27, 2014Updated 11 years ago
- Beagle(bone) in the Middle☆25Oct 9, 2020Updated 5 years ago
- A collection of tools mostly written in Python.☆15Feb 4, 2015Updated 11 years ago
- AI-powered self-healing system for OpenClaw Gateway • 4-tier autonomous recovery • macOS & Linux☆30Updated this week
- PowerShell script utilized to pull several forensic artifacts from a live Win7 and WinXP system without WINRM.☆52Jan 25, 2018Updated 8 years ago
- Finds flaws in your python code☆40Nov 23, 2017Updated 8 years ago
- The Cold Disk Quick Response (CDQR) tool is a fast and easy to use forensic artifact parsing tool that works on disk images, mounted driv…☆343Jun 25, 2022Updated 3 years ago
- Different DFIR and CTI utilities☆39May 13, 2020Updated 5 years ago
- Generates visualizations from the output of flow tools such as SiLK.☆35Dec 8, 2016Updated 9 years ago
- Some dfir stuff☆31Jan 12, 2022Updated 4 years ago
- Python abstract API for PassiveTotal services in the form of libraries and command line utilities.☆86May 22, 2023Updated 2 years ago
- IOC Management and Visualization Tool☆48Dec 8, 2022Updated 3 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆41Jan 20, 2023Updated 3 years ago
- Auxiliary documentation and scripts around "A Reasonably Safe Travel Burner Laptop"☆244Oct 13, 2025Updated 5 months ago
- ☆17Nov 12, 2017Updated 8 years ago
- ☆15Nov 11, 2015Updated 10 years ago
- Malformity is a Maltego project based on the Canari framework for malicious binary and infrastructure research.☆115May 4, 2016Updated 9 years ago
- observation camera honeypot☆53Jun 18, 2015Updated 10 years ago
- Stochastic Traffic Factoring Utility☆16Nov 5, 2016Updated 9 years ago
- Passive Network Audit Framework☆32May 17, 2018Updated 7 years ago
- C# utility that uses WMI to run "cmd.exe /c netstat -n", save the output to a file, then use SMB to read and delete the file remotely☆38Jan 3, 2020Updated 6 years ago
- ☆14May 30, 2018Updated 7 years ago
- Home of Qiew - Reverse engineering tool☆172Apr 20, 2019Updated 6 years ago
- A simple TLS forwarder that lets you intercept traffic and play with them.☆29Apr 29, 2019Updated 6 years ago