woanware / volatility-runner
volatility-runner is a command line application designed to speed up memory forensics using the volatility framework, primarily for instances where the user has multiple memory dumps to analyse.
☆11Updated 5 years ago
Related projects: ⓘ
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 3 years ago
- Crowdstrike Falcon Host script for iterating through instances to get alert and other relevant data☆13Updated 5 years ago
- Just Another broken Registry Parser (JARP)☆15Updated 3 months ago
- ☆19Updated last year
- Registry to JSON. This Project is for learning purposes and is not maintained.☆12Updated 2 years ago
- A list of IOCs applicable to PoshC2☆23Updated 4 years ago
- Git for me to put all my forensics stuff☆21Updated 3 weeks ago
- Attempt to replicate the functions of auto_rip by Corey Harrell in Python.☆13Updated last month
- ☆18Updated this week
- A quick reference guide for python script development in DFIR☆14Updated 5 months ago
- Presentation materials for talks I've given.☆20Updated 4 years ago
- Tools for parsing Forensic images☆41Updated 5 years ago
- Set of utilities for getting information about Windows Events☆15Updated 6 years ago
- A repository containing the research output from my GCFE Gold Paper which compared Windows 10 and Windows 11.☆24Updated 2 years ago
- Links to malware-related YARA rules☆14Updated last year
- Scripts and tools created for appx analysis talk (Magnet summit 2019)☆13Updated 6 months ago
- Carve $MFT records from a chunk of data (for instance a memory dump)☆16Updated 8 years ago
- Parser for Sdba memory pool tags☆17Updated 3 years ago
- Yara rules☆18Updated last year
- PowerShell Script to facilitate the processing of SRUM data for on-the-fly forensics and if needed threat hunting☆16Updated 4 years ago
- LNK to JSON☆14Updated 5 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Updated 6 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆13Updated 3 years ago
- A DFVFS Backed Forensic Viewer☆38Updated 4 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Updated 5 years ago
- Mass Triage Tools☆19Updated 2 months ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆32Updated 7 months ago
- macOS Artifact Intelligence Tool☆13Updated 5 years ago
- ☆10Updated 10 months ago
- PowerShell scripts to aid investigators when utilizing O365 and Magnet Axiom.☆10Updated 3 weeks ago