orlikoski / CDQRLinks
The Cold Disk Quick Response (CDQR) tool is a fast and easy to use forensic artifact parsing tool that works on disk images, mounted drives and extracted artifacts from Windows, Linux, MacOS, and Android devices
☆340Updated 3 years ago
Alternatives and similar repositories for CDQR
Users that are interested in CDQR are comparing it to the libraries listed below
Sorting:
- Collect, Process, and Hunt with host based data from MacOS, Windows, and Linux☆502Updated 2 years ago
- ☆278Updated 2 years ago
- Windows Live Artifacts Acquisition Script☆189Updated 3 years ago
- Powershell Threat Hunting Module☆286Updated 9 years ago
- A threat hunting / data analysis environment based on Python, Pandas, PySpark and Jupyter Notebook.☆247Updated 4 years ago
- "Evolving AppCompat/AmCache data analysis beyond grep"☆205Updated 4 years ago
- CrowdStrike Falcon Orchestrator provides automated workflow and response capabilities☆187Updated last year
- Scripts and code referenced in CrowdStrike blog posts☆335Updated 5 years ago
- User guide of MISP☆275Updated 9 months ago
- Mark Baggett's (@MarkBaggett - GSE #15, SANS SEC573 Author) tool for detecting randomness using NLP techniques rather than pure entropy c…☆128Updated 2 years ago
- ☆193Updated last year
- Salt States for Configuring the SIFT Workstation☆107Updated last week
- ☆219Updated last year
- A framework for orchestrating forensic collection, processing and data export☆329Updated 3 weeks ago
- Collecting & Hunting for IOCs with gusto and style☆241Updated 4 years ago
- An open source framework for enterprise level automated analysis.☆395Updated 3 years ago
- Dump of organized knowledge on DFIR☆135Updated 4 years ago
- Carbon Black API - Python language bindings☆145Updated last year
- Threat Feed Aggregation, Made Easy☆168Updated 5 years ago
- A Splunk app to use MISP in background☆111Updated last week
- Main Build directory☆179Updated 6 years ago
- ATT&CK Remote Threat Hunting Incident Response☆204Updated 9 months ago
- EVTXtract recovers and reconstructs fragments of EVTX log files from raw binary data, including unallocated space and memory images.☆199Updated 6 months ago
- DC3 Malware Configuration Parser (DC3-MWCP) is a framework for parsing configuration information from malware. The information extracted …☆333Updated 7 months ago
- ☆175Updated last year
- Data from a BRAWL Automated Adversary Emulation Exercise☆209Updated 5 years ago
- Security Monitoring Resolution Categories☆138Updated 3 years ago
- Documentation of Cortex☆175Updated 2 years ago
- Invoke-LiveResponse☆149Updated 3 years ago
- ☆304Updated 5 years ago