teamdfir / siftLinks
SIFT
☆516Updated last year
Alternatives and similar repositories for sift
Users that are interested in sift are comparing it to the libraries listed below
Sorting:
- CLI tool to manage a SIFT Install☆420Updated 2 years ago
- Collect, Process, and Hunt with host based data from MacOS, Windows, and Linux☆500Updated 2 years ago
- The Cold Disk Quick Response (CDQR) tool is a fast and easy to use forensic artifact parsing tool that works on disk images, mounted driv…☆339Updated 3 years ago
- CyLR - Live Response Collection Tool☆683Updated 3 years ago
- User guide of MISP☆272Updated 7 months ago
- Digital Forensics artifact repository☆1,146Updated last week
- Scripts and code referenced in CrowdStrike blog posts☆333Updated 5 years ago
- A framework for orchestrating forensic collection, processing and data export☆325Updated last week
- Autopsy Python Plugins☆356Updated 2 months ago
- Tools, techniques, cheat sheets, and other resources to assist those defending organizations and detecting adversaries☆455Updated 3 years ago
- CRITs - Collaborative Research Into Threats☆904Updated 6 years ago
- Documentation of TheHive☆398Updated last year
- FireEye Publicly Shared Indicators of Compromise (IOCs)☆469Updated 6 years ago
- ☆193Updated last year
- Salt States for Configuring the SIFT Workstation☆104Updated 3 weeks ago
- Remote forensics meta tool☆470Updated 4 months ago
- A forensics tool to convert the data in the Windows srum (System Resource Usage Monitor) database to an xlsx spreadsheet.☆705Updated 2 months ago
- DC3 Malware Configuration Parser (DC3-MWCP) is a framework for parsing configuration information from malware. The information extracted …☆329Updated 6 months ago
- Useful network monitoring, analysis, and active response tools used or mentioned in the SANS SEC503 course (https://www.sans.org/course/i…☆233Updated 7 months ago
- A threat hunting / data analysis environment based on Python, Pandas, PySpark and Jupyter Notebook.☆246Updated 4 years ago
- ☆447Updated 8 months ago
- Incident Response Hierarchy of Needs☆462Updated 2 years ago
- Simple Bash IOC Scanner☆749Updated 3 years ago
- Retrieves the definitions of Windows Event Log messages embedded in Windows binaries and provides them in discoverable formats. #nsacyber☆405Updated 2 years ago
- MISP trainings, threat intel and information sharing training materials with source code☆412Updated 2 months ago
- A Powershell incident response framework☆1,605Updated 2 years ago
- ☆200Updated 3 years ago
- DPS' Lightweight Investigation Notebook☆432Updated last year
- Yara Rule Analyzer and Statistics☆379Updated 2 years ago
- A collection of sources of indicators of compromise.☆893Updated 3 months ago