SIFT Bootstrap Script
☆145Jun 20, 2017Updated 8 years ago
Alternatives and similar repositories for sift-bootstrap
Users that are interested in sift-bootstrap are comparing it to the libraries listed below
Sorting:
- Salt States for Configuring the SIFT Workstation☆107Feb 18, 2026Updated last week
- SIFT☆534Feb 14, 2024Updated 2 years ago
- Plugins to add funtionality to ProcDOT. http://www.procdot.com☆25Sep 26, 2023Updated 2 years ago
- irCRpull is a PowerShell script utilized to pull several system artifacts, utilizing the free tool CrowdResponse, from a live Win7+ syste…☆14Mar 25, 2015Updated 10 years ago
- Scripts and code referenced in CrowdStrike blog posts☆337Nov 13, 2019Updated 6 years ago
- Term concordances for each course in the SANS DFIR curriculum. Used for automated index generation.☆69Aug 7, 2020Updated 5 years ago
- ☆280Apr 6, 2023Updated 2 years ago
- Web App for Volatility framework☆390Jan 13, 2026Updated last month
- Some IR notes☆73Jul 23, 2016Updated 9 years ago
- Web interface for the Volatility Memory Forensics Framework☆260Nov 21, 2017Updated 8 years ago
- Example programs used in the automating DFIR series☆63Mar 4, 2019Updated 6 years ago
- ☆816May 24, 2017Updated 8 years ago
- ☆82Jul 5, 2016Updated 9 years ago
- Malformity is a Maltego project based on the Canari framework for malicious binary and infrastructure research.☆115May 4, 2016Updated 9 years ago
- ☆14Dec 5, 2014Updated 11 years ago
- Emulates the Sysinternals Autoruns tool, but for DFIR purposes e.g. multi user processing☆55May 18, 2019Updated 6 years ago
- ☆10May 30, 2015Updated 10 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Jul 18, 2018Updated 7 years ago
- Automater - IP URL and MD5 OSINT Analysis☆552Aug 13, 2024Updated last year
- ELK configuration files for Forensic Analysts and Incident Handlers (unmaintained)☆179Jul 10, 2019Updated 6 years ago
- PowerForensics provides an all in one platform for live disk forensic analysis☆1,428Nov 16, 2023Updated 2 years ago
- ☆453Nov 21, 2024Updated last year
- Rekall Memory Forensic Framework☆1,997Oct 18, 2020Updated 5 years ago
- Force-Directed Graph Generator for Volatility Ouputs☆26Mar 3, 2019Updated 6 years ago
- Cli interface to threatcrowd.org☆20Jul 6, 2017Updated 8 years ago
- ☆64Feb 12, 2022Updated 4 years ago
- VolDiff: Malware Memory Footprint Analysis based on Volatility☆197Sep 12, 2017Updated 8 years ago
- DPS' Lightweight Investigation Notebook☆433Dec 31, 2023Updated 2 years ago
- PowerShell script utilized to pull several forensic artifacts from a live Win7 and WinXP system without WINRM.☆51Jan 25, 2018Updated 8 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆439Feb 24, 2023Updated 3 years ago
- Assimilate is a series of scripts for using the Naïve Bayes algorithm to find potential malicious activity in HTTP headers☆93Oct 15, 2017Updated 8 years ago
- Configuration files for the SOF-ELK VM☆1,719Jan 21, 2026Updated last month
- A Powershell script for frequency analysis of separated values data files.☆17Jan 22, 2014Updated 12 years ago
- Python bindings for Avast antivirus server version for Linux☆15Apr 26, 2014Updated 11 years ago
- Communicate with a remote shell easily☆12Dec 10, 2017Updated 8 years ago
- A tool to retrieve malware directly from the source for security researchers.☆563Jul 27, 2017Updated 8 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆41Jan 20, 2023Updated 3 years ago
- IRMA frontend☆25Nov 28, 2016Updated 9 years ago
- eSentire additions to the nmap network scanner☆14Mar 29, 2016Updated 9 years ago