mnrkbys / ma2tl
macOS forensic timeline generator using the analysis result DBs of mac_apt
☆93Updated last year
Alternatives and similar repositories for ma2tl:
Users that are interested in ma2tl are comparing it to the libraries listed below
- Forensic Artifact Collection Tool for macOS☆110Updated 7 months ago
- Logbook for Digital Forensics and Incident Response☆50Updated 9 months ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆63Updated 2 years ago
- JPCERT/CC public YARA rules repository☆106Updated 4 months ago
- Digital Forensics Artifacts Knowledge Base☆81Updated 11 months ago
- Python based tool to extract forensic info from EventTranscript.db (Windows Diagnostic Data)☆68Updated last year
- Memory Baseliner is a script that can compare two windows memory images or perform frequency of occurrence / data stacking analysis on mu…☆53Updated last year
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Updated last year
- Linux Evidence Acquisition Framework☆114Updated 7 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆51Updated 5 months ago
- ☆22Updated 6 months ago
- ☆87Updated last year
- Chrome Logs Events and Protobuf Parser☆38Updated 2 years ago
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆60Updated 2 years ago
- ☆6Updated 6 months ago
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆95Updated last year
- Detection rule validation☆41Updated last year
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆66Updated last year
- YARA rule analyzer to improve rule quality and performance☆99Updated 3 weeks ago
- Script that checks for available updates for the most commonly used Digital Forensics tools☆59Updated 4 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- Hunt malware with Volatility☆47Updated 11 months ago
- ReWrite of AChoir in Go for Cross Platform☆41Updated 2 months ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆30Updated 2 weeks ago
- The core backend server handling API requests and task management☆38Updated last week
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆76Updated last year
- The Linux DFIR Collector is a stand-alone collection tool for Gnu / Linux. Dump artifacts in json format with very few impacts on the hos…☆31Updated 3 years ago
- Python based CLI for MalwareBazaar☆37Updated 6 months ago
- Initial triage of Windows Event logs☆97Updated 10 months ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆31Updated 3 months ago