log2timeline / dftimewolf
A framework for orchestrating forensic collection, processing and data export
☆310Updated this week
Alternatives and similar repositories for dftimewolf:
Users that are interested in dftimewolf are comparing it to the libraries listed below
- DFIRTrack - The Incident Response Tracking Application☆498Updated 7 months ago
- User guide of MISP☆266Updated 3 months ago
- The Cold Disk Quick Response (CDQR) tool is a fast and easy to use forensic artifact parsing tool that works on disk images, mounted driv…☆336Updated 2 years ago
- Collect, Process, and Hunt with host based data from MacOS, Windows, and Linux☆500Updated 2 years ago
- A cross-platform baselining, threat hunting, and attack surface analysis tool for security teams.☆208Updated 2 weeks ago
- A collection of YARA rules we wish to share with the world, most probably referenced from http://blog.inquest.net.☆374Updated 2 years ago
- Collecting & Hunting for IOCs with gusto and style☆238Updated 3 years ago
- 🧭 The artifactcollector is a customizable agent to collect forensic artifacts on any Windows, macOS or Linux system☆284Updated 2 months ago
- ☆172Updated 9 months ago
- Sigma rules from Joe Security☆208Updated 5 months ago
- A threat hunting / data analysis environment based on Python, Pandas, PySpark and Jupyter Notebook.☆245Updated 3 years ago
- A curated list of awesome things related to TheHive & Cortex☆177Updated 3 years ago
- DC3 Malware Configuration Parser (DC3-MWCP) is a framework for parsing configuration information from malware. The information extracted …☆310Updated 2 months ago
- Repository of YARA rules made by Trellix ATR Team☆589Updated 3 weeks ago
- Splunk code (SPL) for serious threat hunters and detection engineers.☆275Updated last year
- CyLR - Live Response Collection Tool☆673Updated 2 years ago
- Cortex Analyzers Repository☆452Updated this week
- YARA Rules I come across on the internet☆337Updated last year
- MISP trainings, threat intel and information sharing training materials with source code☆405Updated 2 months ago
- Malware repository component for samples & static configuration with REST API interface.☆342Updated 3 weeks ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆149Updated last month
- Mark Baggett's (@MarkBaggett - GSE #15, SANS SEC573 Author) tool for detecting randomness using NLP techniques rather than pure entropy c…☆125Updated 2 years ago
- Extension to Cuckoo Sandbox open source projects, adds support to AWS cloud functionalities and enables running emulation on auto-scaling…☆136Updated 3 years ago
- CASCADE Server☆268Updated 2 years ago
- "Evolving AppCompat/AmCache data analysis beyond grep"☆202Updated 3 years ago
- IOC from articles, tweets for archives☆313Updated last year
- Dump of organized knowledge on DFIR☆134Updated 3 years ago
- Modules for expansion services, enrichment, import and export in MISP and other tools.☆353Updated last week
- Security Monitoring Resolution Categories☆138Updated 3 years ago
- A datasource assessment on an event level to show potential coverage or the MITRE ATT&CK framework☆352Updated 4 years ago