TheHive: a Scalable, Open Source and Free Security Incident Response Platform
-
Updated
Sep 3, 2021 - Scala
{{ message }}
TheHive: a Scalable, Open Source and Free Security Incident Response Platform
A curated list of awesome forensic analysis tools and resources
Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.
Digging Deeper....
Educational, CTF-styled labs for individuals interested in Memory Forensics
Log what files are accessed by any Linux process
Cortex: a Powerful Observable Analysis and Active Response Engine
Documentation of TheHive
Digital Forensics Investigation Platform
IPED Digital Forensic Tool. It is an open source software that can be used to process and analyze digital evidence, often seized at crime scenes by law enforcement or in a corporate investigation by private examiners.
DFIRTrack - The Incident Response Tracking Application
Cortex Analyzers Repository
A list of free and open forensics analysis tools and other resources
Awesome list of digital forensic tools
Everything related to Linux Forensics
A collection of tools for forensic analysis
Python API Client for TheHive
A python application designed to remotely dump RAM of a Linux client and create a volatility profile for later analysis on your local host.
An AFF4 C++ implementation.
Huawei backup decryptor
Bash script to extract data from a "chekcra1ned" iOS device
documentation, scripts, tools related to Zena Forensics (http://blog.digital-forensics.it)
A course on "Digital Forensics" designed and offered in the Computer Science Department at Texas Tech University
MemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR
Collaborative, web-based case management for incident response
Digital Forensics with Kali Linux, published by Packt
The Python implementation of the AFF4 standard.
Cyber-investigation Analysis Standard Expression (CASE) Ontology
Add a description, image, and links to the digital-forensics topic page so that developers can more easily learn about it.
To associate your repository with the digital-forensics topic, visit your repo's landing page and select "manage topics."
We're trying to process a series of .pcap files captured over time and hoped we could use tcpflow for both extracting the payloads and keeping track of the sessions' states at the same time using the written DFXML.
From the man page I understood that using
-Ron the next file (n) should complete TCP flows. Unfortunately it is not really clear what this exactly means and if this should have ef