mnrkbys / ma2tl
macOS forensic timeline generator using the analysis result DBs of mac_apt
☆92Updated last year
Alternatives and similar repositories for ma2tl:
Users that are interested in ma2tl are comparing it to the libraries listed below
- Logbook for Digital Forensics and Incident Response☆50Updated 8 months ago
- Digital Forensics Artifacts Knowledge Base☆80Updated 10 months ago
- Forensic Artifact Collection Tool for macOS☆106Updated 6 months ago
- JPCERT/CC public YARA rules repository☆106Updated 3 months ago
- FJTA (Forensic Journal Timeline Analyzer) is a tool that analyzes Linux filesystem (EXT4, XFS) journals (not systemd-journald), generates…☆58Updated last week
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆63Updated 2 years ago
- ☆22Updated 5 months ago
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆66Updated last year
- Memory Baseliner is a script that can compare two windows memory images or perform frequency of occurrence / data stacking analysis on mu…☆52Updated last year
- Python based tool to extract forensic info from EventTranscript.db (Windows Diagnostic Data)☆68Updated last year
- A toolkit for the post-mortem examination of Docker containers from forensic HDD copies☆98Updated last year
- Chrome Logs Events and Protobuf Parser☆38Updated 2 years ago
- acquire is a tool to quickly gather forensic artifacts from disk images or a live system into a lightweight container.☆99Updated 2 weeks ago
- The Linux DFIR Collector is a stand-alone collection tool for Gnu / Linux. Dump artifacts in json format with very few impacts on the hos…☆30Updated 3 years ago
- YARA rule analyzer to improve rule quality and performance☆97Updated 3 months ago
- USN Journal full path builder☆57Updated 6 months ago
- A script that updates KAPE (using Get-KAPEUpdate.ps1) as well as EZ Tools (within .\KAPE\Modules\bin) and the ancillary files that enhanc…☆55Updated last month
- Remote access and Antivirus Logging Database☆42Updated 10 months ago
- ☆6Updated 5 months ago
- Jupyter Notebooks for Cyber Threat Intelligence☆36Updated last year
- BlackBerry Threat Research & Intelligence☆98Updated last year
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆76Updated last year
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Updated 11 months ago
- ReWrite of AChoir in Go for Cross Platform☆39Updated last month
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆51Updated 3 months ago
- Detection Engineering with YARA☆87Updated last year
- macOS Artifacts☆27Updated 3 weeks ago
- Yara Based Detection Engine for web browsers☆47Updated 3 years ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆32Updated 4 months ago
- The core backend server handling API requests and task management☆38Updated 2 weeks ago