mac_apt
timesketch
Our great sponsors
mac_apt | timesketch | |
---|---|---|
2 | 2 | |
716 | 2,485 | |
- | 1.2% | |
7.6 | 8.7 | |
5 days ago | 6 days ago | |
Python | Python | |
MIT License | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
mac_apt
- My productivity app is a never-ending .txt file
-
Mac OS
If you are capable of running cli applications macApt is pretty sophisticated and feature rich analysis tool for MacOS. If it doesn’t have the exact feature you need you could extend it to identify activities of this ‘foreign’ software. Full disclosure I contributed to this project by developing the Docker container, and published the work, unpaid.
timesketch
-
Custom DFIR
Want to put those processed plaso files in an elasticsearch instance check out Timesketch - https://github.com/google/timesketch.
- Any Timeline self hosted types of software?
What are some alternatives?
usbrip - Tracking history of USB events on GNU/Linux
plaso - Super timeline all the things
RecuperaBit - A tool for forensic file system reconstruction.
WELA - WELA (Windows Event Log Analyzer): The Swiss Army knife for Windows Event Logs! ゑ羅(ウェラ)
docker-explorer - A tool to help forensicate offline docker acquisitions
TimelineJS - TimelineJS: A Storytelling Timeline built in JavaScript.
beagle - Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.
hindsight - Web browser forensics for Google Chrome/Chromium
MalConfScan - Volatility plugin for extracts configuration data of known malware
turbinia - Automation and Scaling of Digital Forensics Tools
velociraptor - Digging Deeper....
varc - Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of particular use when investigating a security incident.