orlikoski / CDQRLinks
The Cold Disk Quick Response (CDQR) tool is a fast and easy to use forensic artifact parsing tool that works on disk images, mounted drives and extracted artifacts from Windows, Linux, MacOS, and Android devices
☆337Updated 2 years ago
Alternatives and similar repositories for CDQR
Users that are interested in CDQR are comparing it to the libraries listed below
Sorting:
- Collect, Process, and Hunt with host based data from MacOS, Windows, and Linux☆501Updated 2 years ago
- ☆276Updated 2 years ago
- A framework for orchestrating forensic collection, processing and data export☆315Updated last week
- Windows Live Artifacts Acquisition Script☆188Updated 2 years ago
- Powershell Threat Hunting Module☆283Updated 8 years ago
- "Evolving AppCompat/AmCache data analysis beyond grep"☆204Updated 3 years ago
- Dump of organized knowledge on DFIR☆134Updated 3 years ago
- A threat hunting / data analysis environment based on Python, Pandas, PySpark and Jupyter Notebook.☆246Updated 3 years ago
- CrowdStrike Falcon Orchestrator provides automated workflow and response capabilities☆186Updated last year
- Automated, Collection, and Enrichment Platform☆325Updated 5 years ago
- ATT&CK Remote Threat Hunting Incident Response☆200Updated 5 months ago
- 16,432 Free Yara rules created by☆383Updated 6 years ago
- Collecting & Hunting for IOCs with gusto and style☆238Updated 3 years ago
- Python script to decode common encoded PowerShell scripts☆215Updated 6 years ago
- Mark Baggett's (@MarkBaggett - GSE #15, SANS SEC573 Author) tool for detecting randomness using NLP techniques rather than pure entropy c…☆125Updated 2 years ago
- ☆302Updated 4 years ago
- User guide of MISP☆268Updated 5 months ago
- ☆200Updated 3 years ago
- Threat Feed Aggregation, Made Easy☆168Updated 4 years ago
- Automated Use Case Testing☆167Updated 7 years ago
- CyLR - Live Response Collection Tool☆680Updated 3 years ago
- Web App for Volatility framework☆380Updated 6 months ago
- Evolving directions on building the best Open Source Forensics VM☆160Updated 6 years ago
- Web interface for the Volatility Memory Forensics Framework☆260Updated 7 years ago
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆289Updated 7 years ago
- DC3 Malware Configuration Parser (DC3-MWCP) is a framework for parsing configuration information from malware. The information extracted …☆320Updated 3 months ago
- Salt States for Configuring the SIFT Workstation☆103Updated 2 weeks ago
- A repo containing tools developed by Carbon Black's Threat Research Team: Threat Analysis Unit☆234Updated 3 years ago
- Scripts and code referenced in CrowdStrike blog posts☆331Updated 5 years ago
- MITRE ATT&CK Windows Logging Cheat Sheets☆340Updated 6 years ago