The Linux DFIR Collector is a stand-alone collection tool for Gnu / Linux. Dump artifacts in json format with very few impacts on the host system. Created for incident response Team.
☆33Mar 9, 2022Updated 4 years ago
Alternatives and similar repositories for DFIR_Linux_Collector
Users that are interested in DFIR_Linux_Collector are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Bring Your Own Mitre Att&ck © Matrix !☆13Oct 19, 2023Updated 2 years ago
- DFIRLab / Plateforme d'investigation numérique☆15Jul 6, 2021Updated 4 years ago
- Sigma rules converted for direct use with Zircolite☆14Mar 16, 2026Updated last week
- Scripts to integrate DFIR-IRIS, MISP and TimeSketch☆36Feb 2, 2022Updated 4 years ago
- Knowing which rule should trigger according to the redcannary test☆11Nov 23, 2024Updated last year
- ☆18Jan 18, 2022Updated 4 years ago
- Volatility3 Linux profiles☆76Dec 8, 2025Updated 3 months ago
- ☆69May 3, 2021Updated 4 years ago
- ☆54May 14, 2024Updated last year
- Python client for DFIR-IRIS☆25Aug 19, 2024Updated last year
- Volatility Symbol Generator for Linux Kernels☆36Nov 15, 2023Updated 2 years ago
- Tool to extract indicators of compromise from security reports in PDF,HTML,Web,Text format☆10Nov 6, 2017Updated 8 years ago
- Helping Incident Responders hunt for potential persistence mechanisms on UNIX-based systems.☆17Oct 28, 2023Updated 2 years ago
- enpoint detection / live analysis & sandbox host / signatures quality test☆44Apr 22, 2021Updated 4 years ago
- Incident Response - Fast suspicious file finder☆253Jan 24, 2026Updated last month
- simple webapp for converting sigma rules into siem queries using the pySigma library☆50Sep 1, 2023Updated 2 years ago
- Volatility, on Docker 🐳☆41Nov 20, 2025Updated 4 months ago
- The home of the SDDLMaker☆28Jan 13, 2025Updated last year
- MBC v2.x expressed in STIX 2.1 JSON☆16Oct 3, 2023Updated 2 years ago
- Learn about a network from a pcap file or reading from an interface☆29Apr 6, 2024Updated last year
- Jupyter Notebooks for Digital Forensics & Incident Response☆10Nov 23, 2021Updated 4 years ago
- Live forensic artifacts collector☆172Jul 5, 2024Updated last year
- Simple Script to Help You Find All Files Has Been Modified, Accessed, and Created In A Range Time.☆27Dec 1, 2022Updated 3 years ago
- UAC is a powerful and extensible incident response tool designed for forensic investigators, security analysts, and IT professionals. It …☆1,263Mar 14, 2026Updated last week
- Python library for dissecting and parsing Cobalt Strike related data such as Beacon payloads and Malleable C2 Profiles☆187Updated this week
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆32Nov 23, 2025Updated 4 months ago
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆791Mar 14, 2026Updated last week
- Repository for different Windows DFIR related CMDs, PowerShell CMDlets, etc, plus workshops that I did for different conferences or event…☆77Jul 13, 2021Updated 4 years ago
- Check Sigma rules for easy-to-bypass whitelists to make them more robust (https://github.com/SigmaHQ/sigma)☆15Feb 1, 2021Updated 5 years ago
- Algorithme d'apprentissage statistique permettant de créer un modèle sur les lignes de commandes des évènements "Création de Processus", …☆83Feb 21, 2024Updated 2 years ago
- Forensics artefact collection tool for systems running Microsoft Windows☆433Mar 26, 2025Updated 11 months ago
- Import specific data sources into the Sigma generic and open signature format.☆79May 6, 2022Updated 3 years ago
- Repository for Ludus french templates☆23Mar 1, 2026Updated 3 weeks ago
- Web Application for domain name monitoring / alerting☆65Aug 1, 2024Updated last year
- Artifact collection tool for *nix systems☆213Mar 20, 2024Updated 2 years ago
- A parser of Windows Defender's DetectionHistory forensic artifact, containing substantial info about quarantined files and executables.☆117Jan 26, 2022Updated 4 years ago
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆21Jul 1, 2023Updated 2 years ago
- Honeypot for file uploads. Written in Go.☆16Feb 14, 2026Updated last month
- Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.☆68Apr 12, 2022Updated 3 years ago