Skip to content
#

dfir-automation

Here are 44 public repositories matching this topic...

AWMFA - Automated Windows Memory Forensics Analysis. Python automation framework for Volatility 2 that streamlines memory analysis. Features: automated plugin execution with threading, intelligent threat detection using 28+ heuristics, no deep Windows internals knowledge required, multi-format reports (TXT/HTML/PDF).

  • Updated Nov 8, 2025
  • Python

osquery_hunter is a lightweight, Python-based triage helper for Windows systems. It uses osquery to enumerate running processes, network sockets, and signatures — helping analysts quickly spot unsigned or suspicious binaries. Ideal for DFIR, incident response, and blue-team investigations in environments without full EDR coverage.

  • Updated Oct 18, 2025
  • Python

HybridHashScanner is a versatile command-line tool for analyzing file hashes against multiple threat intelligence services, including MISP, CIRCL Hashlookup, OTX, Kaspersky, and VirusTotal. It supports single hash lookups, batch processing from CSV/TXT files, caching via SQLite, multithreading for efficiency, and optional Tor integration for anonym

  • Updated Aug 14, 2025
  • Python

This tool monitors Velociraptor's syslog messages for specific actions performed by users within the Velociraptor DFIR platform. When certain patterns are detected, it sends detailed email notifications to designated recipients, providing enhanced visibility into user activities and potential security events.

  • Updated May 2, 2025
  • Python

Improve this page

Add a description, image, and links to the dfir-automation topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the dfir-automation topic, visit your repo's landing page and select "manage topics."

Learn more