xophidia / DFIR_Linux_Collector
The Linux DFIR Collector is a stand-alone collection tool for Gnu / Linux. Dump artifacts in json format with very few impacts on the host system. Created for incident response Team.
☆30Updated 2 years ago
Alternatives and similar repositories for DFIR_Linux_Collector:
Users that are interested in DFIR_Linux_Collector are comparing it to the libraries listed below
- YARA rule analyzer to improve rule quality and performance☆96Updated last month
- JPCERT/CC public YARA rules repository☆106Updated 2 months ago
- ☆86Updated last year
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆76Updated last year
- Memory Baseliner is a script that can compare two windows memory images or perform frequency of occurrence / data stacking analysis on mu…☆51Updated last year
- IOC Collection 2022☆57Updated last year
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆94Updated last year
- ☆5Updated 3 months ago
- ☆65Updated this week
- Initial triage of Windows Event logs☆95Updated 8 months ago
- Rules Shared by the Community from 100 Days of YARA 2023☆77Updated last year
- Jupyter Notebooks for Cyber Threat Intelligence☆36Updated last year
- Sigma rules to share with the community☆118Updated 3 weeks ago
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆58Updated 2 years ago
- Script to automate Linux live evidence collection☆27Updated 2 years ago
- Collection of scripts provided for public use☆34Updated 3 months ago
- ☆38Updated 3 years ago
- Active C&C Detector☆152Updated last year
- Yara Rules for Modern Malware☆73Updated 11 months ago
- A repository to share publicly available Velociraptor detection content☆126Updated this week
- Full of public notes and Utilities☆97Updated last week
- Powershell sandboxing utility☆18Updated this week
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆32Updated 2 months ago
- Blueteam operational triage registry hunting/forensic tool.☆145Updated last year
- A running list of Windows sources and the related event ids.☆19Updated last year
- Detection Engineering with YARA☆87Updated last year
- A home for detection content developed by the delivr.to team☆67Updated 2 weeks ago
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆165Updated 2 years ago
- ☆28Updated this week
- Forensics artifacts collection☆19Updated 3 years ago