nrrpinto / inquisitor
Forensics artifacts collection
☆19Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for inquisitor
- ☆19Updated last year
- Random tips and tricks RE: ransomware☆14Updated 3 years ago
- Sigma detection rules for hunting with the threathunting-keywords project☆47Updated last week
- The ultimate solution for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆22Updated 2 months ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 6 months ago
- This repo is where I store my Threat Hunting ideas/content☆85Updated last year
- Simple PowerShell script to enable process scanning with Yara.☆90Updated 2 years ago
- ☆43Updated 3 weeks ago
- Linux Baseline and Forensic Triage Tool - BETA☆50Updated 2 years ago
- Random notes collected on the intertubes relating to DFIR☆32Updated last year
- ☆34Updated 8 months ago
- An exercise to practice deobfuscating PowerShell Scripts.☆28Updated last year
- Collection of scripts/resources/ideas for attack surface reduction and additional logging to enable better threat hunting on Windows endp…☆38Updated 7 months ago
- Script to automate Linux live evidence collection☆27Updated 2 years ago
- Simple Script to Help You Find All Files Has Been Modified, Accessed, and Created In A Range Time.☆27Updated last year
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 2 years ago
- Hunt malware with Volatility☆47Updated 6 months ago
- ☆61Updated 3 years ago
- A tool to display Windows Event logs as they happen.☆12Updated last year
- Memory Baseliner is a script that can compare two windows memory images or perform frequency of occurrence / data stacking analysis on mu…☆49Updated last year
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆56Updated 3 weeks ago
- ☆84Updated 8 months ago
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆93Updated 11 months ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆68Updated 11 months ago
- ☆28Updated 3 years ago
- ReWrite of AChoir in Go for Cross Platform☆34Updated 3 weeks ago
- Contains compiled binaries of Volatility☆29Updated 3 weeks ago
- Baseline a Windows System against LOLBAS☆24Updated 6 months ago