superponible / DFIRLinks
Various DFIR Tools
☆26Updated 7 years ago
Alternatives and similar repositories for DFIR
Users that are interested in DFIR are comparing it to the libraries listed below
Sorting:
- A Windows Event Processing Utility☆47Updated 7 years ago
- Some IR notes☆73Updated 9 years ago
- Force-Directed Graph Generator for Volatility Ouputs☆26Updated 6 years ago
- Some dfir stuff☆31Updated 3 years ago
- Various Modules & Scripts for use with Viper Framework☆27Updated 6 years ago
- A GC link parser for both linkfiles and jumplists.☆18Updated 8 years ago
- Sandbox feature upgrade with the help of wrapped samples☆76Updated 7 years ago
- Open Development projects for TekDefense☆77Updated 8 years ago
- misc scripts☆36Updated 6 years ago
- Python interface to the CRITs API☆22Updated 8 years ago
- Incident Response Scripts☆30Updated 5 years ago
- ☆37Updated 8 years ago
- ☆82Updated 9 years ago
- Automation for VirusTotal☆31Updated 9 years ago
- Assorted classes and methods for indexing reports and retrieving information from an elastic index☆21Updated 9 years ago
- Various scrips☆12Updated 2 years ago
- Parses IE's Automatic Crash Recovery Files☆16Updated 8 years ago
- Various tools and scripts☆43Updated 2 years ago
- Python IOC Editor☆63Updated 10 years ago
- Carve NTFS USN records from binary data☆26Updated 8 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆78Updated 5 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Updated 7 years ago
- An ICAP Server with yara scanner for URL and content.☆58Updated 8 months ago
- Performs OCR on image files and scans them for matches to YARA rules☆41Updated 6 years ago
- A repo to hold some scripts pertaining WMI (Windows implementation of WBEM) forensics☆87Updated 7 years ago
- Technical add-on to ingest json formatted volatility memory analysis plugin outputs☆13Updated 7 years ago
- Command-line Interface for Binar.ly☆38Updated 8 years ago
- threadmap plugin for Volatility Foundation☆27Updated 4 years ago
- Recurse through a registry, identifying values with large data -- a registry malware hunter☆45Updated 8 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Updated 7 years ago