velociraptor
plaso
velociraptor | plaso | |
---|---|---|
5 | 3 | |
2,665 | 1,623 | |
2.6% | 1.0% | |
9.6 | 9.0 | |
3 days ago | 16 days ago | |
Go | Python | |
GNU General Public License v3.0 or later | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
velociraptor
- How to carry out mass Digital Forensic Collections using open source tools?
- List Of Free Web-based OpenSource Tools For Incident Response
-
Custom DFIR
However, what you are trying to do has already been done. For collections look at velociraptor's offline collector https://github.com/Velocidex/velociraptor. For processing check out Log2Timeline (plaso) https://github.com/log2timeline/plaso.
- New blue team
-
We are a security team with 20+ years of ethical hacking, and we've defended over 2 million attacks with Blumira. Ask Us Anything.
https://github.com/Velocidex/velociraptor - purchased recently but still a great tool
plaso
-
Custom DFIR
However, what you are trying to do has already been done. For collections look at velociraptor's offline collector https://github.com/Velocidex/velociraptor. For processing check out Log2Timeline (plaso) https://github.com/log2timeline/plaso.
-
I feel like I'm putting the cart before the horse. Noob question.
I see other folks already mentioned: think about trying to tell a story, rather than just like, looking at all the events (A tool like Plaso can help you timeline logs so you can see things chronologically which can help in telling a story about what happened across many log sources)
-
Solving a child porn case (student environment)
My advice would be to go through a timeline to assert the activity before and after these files "appeared" . This can be done in log2timeline / plaso , this script can parse the raw image (or e01 or whatever you have) and build a timeline , parse it and sort it. Also look for lnk files and shellbags to see if the files were opened , used etc.
What are some alternatives?
Wazuh - Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
IPED - IPED Digital Forensic Tool. It is an open source software that can be used to process and analyze digital evidence, often seized at crime scenes by law enforcement or in a corporate investigation by private examiners.
grr - GRR Rapid Response: remote live forensics for incident response
timesketch - Collaborative forensic timeline analysis
TheHive - TheHive: a Scalable, Open Source and Free Security Incident Response Platform
mvt - MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.
sigma - Main Sigma Rule Repository
OpenTimelineIO - Open Source API and interchange format for editorial timeline information.
dfirtrack - DFIRTrack - The Incident Response Tracking Application
covid-19-germany-gae - COVID-19 statistics for Germany. For states and counties. With time series data. Daily updates. Official RKI numbers.
cariddi - Take a list of domains, crawl urls and scan for endpoints, secrets, api keys, file extensions, tokens and more
srum-dump - A forensics tool to convert the data in the Windows srum (System Resource Usage Monitor) database to an xlsx spreadsheet.