Quantcast
Channel: DFIR Training - Recently Added Listings
Browsing all 888 articles
Browse latest View live

lorg

Apache Logfile Security Analyzer

View Article


Fastir_Collector_Linux

This tool collects different artefacts on live Linux and records the results in csv files. With the analysis of these artefacts, an early compromission can be detected. All code must be in a python...

View Article


Image may be NSFW.
Clik here to view.

Network Security Toolkit

Network Security Toolkit (NST) is a bootable ISO image (Live DVD/USB Flash Drive) based on Fedora 24 providing easy access to best-of-breed Open Source Network Security Applications and should run on...

View Article

Linux Forensics Tools Repository

The CERT Linux Forensics Tools Repository provides many useful packages for cyber forensics acquisition and analysis practitioners.

View Article

threat_note

DPS' Lightweight Investigation Notebook threat_note is a web application built by Defense Point Security to allow security researchers the ability to add and retrieve indicators related to their...

View Article


SCOT - Sandia Cyber Omni Tracker

SCOT is an Incident Response collaboration and knowledge capture tool focused on flexability and ease of use. Our goal is to add value to the incident response process without burdening the user....

View Article

Image may be NSFW.
Clik here to view.

Request Tracker for Incident Response

As it's technically an extension, RTIR builds on all the features of RT and provides pre-configured queues and workflows designed for incident response teams. It's the tool of choice for many CERT and...

View Article

Image may be NSFW.
Clik here to view.

FIR

FIR (Fast Incident Response) is an cybersecurity incident management platform designed with agility and speed in mind. It allows for easy creation, tracking, and reporting of cybersecurity incidents....

View Article


CDQR — Cold Disk Quick Response tool by Alan Orlikoski

The Cold Disk Quick Response (CDQR) tool is a fast and easy to use forensic artifact parsing tool that works on disk images, mounted drives and extracted artifacts from Windows, Linux and MacOS...

View Article


searchgiant_cli

Command line forensic imaging utility for cloud services. This program was designed for my Applied Research Project at John Jay University for my masters degree in digital forensics and cyber security....

View Article

traceroute-circl

traceroute-circl is an extended traceroute to support the activities of CSIRT (or CERT) operators. Usually CSIRT team have to handle incidents based on IP addresses received. Features Display abuse and...

View Article

Stenographer

Stenographer is a full-packet-capture utility for buffering packets to disk for intrusion detection and incident response purposes. It provides a high-performance implementation of NIC-to-disk packet...

View Article

pt-stalk¶

pt-stalk waits for a trigger condition to occur, then collects data to help diagnose problems. The tool is designed to run as a daemon with root privileges, so that you can diagnose intermittent...

View Article


PSRecon

PSRecon gathers data from a remote Windows host using PowerShell (v2 or later), organizes the data into folders, hashes all extracted data, hashes PowerShell and various system properties, and sends...

View Article

RetroScope

The majority of RetroScope's code is in the dalvik/vm/zombie directory. Please be sure to read the RetroScope paper before working with RetroScope. This code is provided as is. If you extend it in any...

View Article


ElasticHandler

Assorted classes and methods for indexing reports and retrieving information from an elastic index.

View Article

Image may be NSFW.
Clik here to view.

kirjuri

Kirjuri is a web application for managing physical forensic evidence.

View Article


Image may be NSFW.
Clik here to view.

Efetch

Efetch is just a way to view files from log2timeline.  Efetch currently supports viewing images, office documents, sqlite databases, registries, pst files, and more....

View Article

Crowbar

Crowbar (formally known as Levye) is a brute forcing tool that can be used during penetration tests. It was developed to brute force some protocols in a different manner according to other popular...

View Article

CyFIR

"CyFIR Enterprise® is a revolutionary enterprise digital forensics platform designed to maximize an organization’s Speed to Resolution™ when handling a computer security incident, an eDiscovery...

View Article
Browsing all 888 articles
Browse latest View live