A little tool to play with Azure Identity - Azure and Entra ID lab creation tool. Blog: https://medium.com/@iknowjason/sentinel-for-purple-teaming-183b7df7a2f4
-
Updated
Mar 21, 2025 - Python
A little tool to play with Azure Identity - Azure and Entra ID lab creation tool. Blog: https://medium.com/@iknowjason/sentinel-for-purple-teaming-183b7df7a2f4
Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of particular use when investigating a security incident.
Graph Visualization for windows event logs
Rip Raw is a small tool to analyse the memory of compromised Linux systems.
Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https://circl.lu/services/hashlookup/
Fast lookup server for NSRL and other hash database used in digital forensic
Pipeline that allows sending forensic artifacts to OpenRelik for automatic processing
Toolset to analyze disks encrypted with McAFee FDE technology
ActiveMime File Format Documentation
Sabonis, a Digital Forensics and Incident Response pivoting tool
CLI generator for Velociraptor offline collector
A Python, Boto3 script that leverages a forensic volume to attach & mount to a selected instance, run a memory dump, unmount and detach from the selected instance and finally attach & mount to a Forensic Workstation
🚀 IRIS-SOAR: Modular SOAR (Security Orchestration, Automation, and Response) implementation in Python. Designed to complement DFIR-IRIS through playbook automation and seamless integrations. Easily extensible and in active development. Join us in building a tool geared towards enhancing security efficiency!
Orchestration Software for Incident Response
AutoParser is a forensic tool for parsing offline registry hives.
Cortex-Analyzers Modified - SecTeam/CERT/SOC Security orchestration tools on steroids
🕵️♂️ Unlock the story hidden in data - Your digital investigation partner. TheSleuthKit (TSK) Python Wrapper.
This script is designed to pull data from the carbon black cloud. One disadvantage of the CBC GUI is the inability to see the command line for each process in bulk. Instead, you need to click on each process individually. This spits out the command line so you can quickly spot evil.
HybridHashScanner is a versatile command-line tool for analyzing file hashes against multiple threat intelligence services, including MISP, CIRCL Hashlookup, OTX, Kaspersky, and VirusTotal. It supports single hash lookups, batch processing from CSV/TXT files, caching via SQLite, multithreading for efficiency, and optional Tor integration for anonym
Extract and normalize information from forensics artifacts
Add a description, image, and links to the dfir-automation topic page so that developers can more easily learn about it.
To associate your repository with the dfir-automation topic, visit your repo's landing page and select "manage topics."