Automating incident response: scalable & fast, within minutes

Incident Response
GitHub - log2timeline/plaso: Super timeline all the things
Super timeline all the things. Contribute to log2timeline/plaso development by creating an account on GitHub.
GitHub - fox-it/dissect: Dissect is a digital forensics & incident response framework and toolset that allows you to quickly access and analyse forensic artefacts from various disk and file formats, developed by Fox-IT (part of NCC Group).
Dissect is a digital forensics & incident response framework and toolset that allows you to quickly access and analyse forensic artefacts from various disk and file formats, developed by Fox-IT...
Event Log Viewer for Windows 11 / 10 / 8 / 7 / Vista
Simple tool for Windows 11/10/8/7/Vista that displays in a table the details of all events from the event logs of Windows, including the event description
MDwiki
SDB Explorer, MFTExplorer, Registry Explorer, Timeline Explorer, etc.
Advanced%20 linux%20 detection%20and%20 forensics%20 cheatsheet%20by%20 defensive%20 security
OpenRelik
OpenRelik OpenRelik is an open-source (Apache-2.0) platform designed to streamline collaborative digital forensic investigations. It combines modular workflows for custom investigative processes, an intuitive interface for efficient workflow management, real-time collaboration features, and a centralized repository for shared artifacts. The platform is easy to extend with new workers to adapt to evolving forensic needs. Key concepts Archtecture Getting started Code
The Key to Identify PsExec - AboutDFIR - The Definitive Compendium Project
In one way or another, PsExec - a wildly popular remote administration tool in the Microsoft SysInternals Suite, peeks its head in the wild. Threat actors tend to leverage PsExec for various reasons such as executing programs on a remote host in a victim’s environment or for more nefarious reasons such as deploying ransomware. The focus of this blog is to bring attention to a relatively new method in identifying the source host in which PsExec was executed from. This is something that has caught my attention on a few IR engagements that I have worked on recently. Huge shoutout to Joseph Ziemba for first bringing this to my attention on one of our ransomware engagements we worked on together at KPMG.
tclahr/uac: UAC is a Live Response collection script for Incident Response that makes use of native binaries and tools to automate the collection of AIX, Android, ESXi, FreeBSD, Linux, macOS, NetBSD, NetScaler, OpenBSD and Solaris systems artifacts.
UAC is a Live Response collection script for Incident Response that makes use of native binaries and tools to automate the collection of AIX, Android, ESXi, FreeBSD, Linux, macOS, NetBSD, NetScaler...
Hunting Keywords
Hypothesis-Driven Hunting with the PEAK Framework
Details on hypothesis-driven threat hunting with the PEAK framework.
The RULER Project
The Really Useful Logging and Event Repository Project
0x4D31/awesome-threat-detection
✨ A curated list of awesome threat detection and hunting resources 🕵️♂️
UncoderIO/Uncoder_IO: An IDE and translation engine for detection engineers and threat hunters. Be faster, write smarter, keep 100% privacy.
An IDE and translation engine for detection engineers and threat hunters. Be faster, write smarter, keep 100% privacy. - GitHub - UncoderIO/Uncoder_IO: An IDE and translation engine for detection e...
google/grr
GRR Rapid Response: remote live forensics for incident response
Yamato-Security/hayabusa: Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs. - GitHub - Yamato-Security/hayabusa: Hayabusa (隼) is a sigma-based threat hunting and fast...
jtmoon79/super-speedy-syslog-searcher
Speedily search and merge log messages by datetime
LetsDefend/incident-response-playbooks
Contribute to LetsDefend/incident-response-playbooks development by creating an account on GitHub.
ufrisk/MemProcFS: MemProcFS
MemProcFS. Contribute to ufrisk/MemProcFS development by creating an account on GitHub.
dfir-dd/dfir-toolkit
CLI tools for forensic investigation of Windows artifacts
0x4D31/detection-and-response-pipeline: ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The purpose is to create a reference hub for designing effective threat detection and response pipelines. 👷 🏗
✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The purpose is to create a reference hub for designing effective...
GitHub - cugu/awesome-forensics: A curated list of awesome forensic analysis tools and resources
A curated list of awesome forensic analysis tools and resources - GitHub - cugu/awesome-forensics: A curated list of awesome forensic analysis tools and resources
Linux Forensics
Everything related to Linux Forensics
GitHub - meirwah/awesome-incident-response: A curated list of tools for incident response
A curated list of tools for incident response. Contribute to meirwah/awesome-incident-response development by creating an account on GitHub.
DFIR triage and Timeline Analysis
During incident response, it is essential to establish a full context around the time of alert or when suspicious activity was identified…