AdtimelineTimeline of Active Directory changes with replication metadata
DetectionlabAutomate the creation of a lab environment complete with security tooling and logging best practices
DfirtrackDFIRTrack - The Incident Response Tracking Application
Vast🔮 Visibility Across Space and Time
Threathunter PlaybookA Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.
Atc ReactA knowledge base of actionable Incident Response techniques
UserlineQuery and report user logons relations from MS Windows Security Events
MalwlessTest Blue Team detections without running any attack.
SlidesMisc Threat Hunting Resources
Dfir OrcForensics artefact collection tool for systems running Microsoft Windows
PockintA portable OSINT Swiss Army Knife for DFIR/OSINT professionals 🕵️ 🕵️ 🕵️
WhidsOpen Source EDR for Windows
Misp WarninglistsWarning lists to inform users of MISP about potential false-positives or other information in indicators
Imago ForensicsImago is a python tool that extract digital evidences from images.
ZombieantZombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.
ThehiveTheHive: a Scalable, Open Source and Free Security Incident Response Platform
LokiLoki - Simple IOC and Incident Response Scanner
OrianaOriana is a threat hunting tool that leverages a subset of Windows events to build relationships, calculate totals and run analytics. The results are presented in a Web layer to help defenders identify outliers and suspicious behavior on corporate environments.
LogontracerInvestigate malicious Windows logon by visualizing and analyzing Windows event log
MthcAll-in-one bundle of MISP, TheHive and Cortex
TimesketchCollaborative forensic timeline analysis
CirtkitTools for the Computer Incident Response Team 💻
LolbasLiving Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
KiewtaiA port of Kaitai to the Hiew hex editor
ThreathuntThreatHunt is a PowerShell repository that allows you to train your threat hunting skills.
MaliceVirusTotal Wanna Be - Now with 100% more Hipster
Lw YaraYara Ruleset for scanning Linux servers for shells, spamming, phishing and other webserver baddies
Etl ParserEvent Trace Log file parser in pure Python
MimirSmart OSINT collection of common IOC types
AutotimelinerAutomagically extract forensic timeline from volatile memory dump
ScriptingPS / Bash / Python / Other scripts For FUN!
YetiYour Everyday Threat Intelligence
HistoricprocesstreeAn Incident Response tool that visualizes historic process execution evidence (based on Event ID 4688 - Process Creation Event) in a tree view.
MalcomMalcom - Malware Communications Analyzer
BeagleBeagle is an incident response and digital forensics tool which transforms security logs and data into graphs.
Forensic ToolsCIRCL system forensic tools or a jumble of tools to support forensic
Artifacts📇 Digital Forensics Artifact Repository (forensicanalysis edition)
ThreathuntingA Splunk app mapped to MITRE ATT&CK to guide your threat hunts
MemlabsEducational, CTF-styled labs for individuals interested in Memory Forensics
CortexCortex: a Powerful Observable Analysis and Active Response Engine
HindsightWeb browser forensics for Google Chrome/Chromium
DiffyDiffy is a triage tool used during cloud-centric security incidents, to help digital forensics and incident response (DFIR) teams quickly identify suspicious hosts on which to focus their response.
TurbiniaAutomation and Scaling of Digital Forensics Tools
ZeekZeek is a powerful network analysis framework that is much different from the typical IDS you may know.
LookylooLookyloo is a web interface that allows users to capture a website page and then display a tree of domains that call each other.