beagle
Kuiper
Our great sponsors
beagle | Kuiper | |
---|---|---|
1 | 2 | |
1,250 | 717 | |
- | - | |
0.0 | 6.7 | |
over 1 year ago | 4 months ago | |
Python | JavaScript | |
MIT License | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
beagle
Kuiper
- DFIRKuiper/Kuiper - Digital Forensics Investigation Platform
- Kuiper is a digital investigation platform that provides a capabilities for the investigation team and individuals to parse, search, visualize collected evidences (evidences could be collected by fast traige script like Hoarder). Collaborate with other team members on the same platforms.
What are some alternatives?
evtx-hunter - evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.
awesome-incident-response - A curated list of tools for incident response
dfirtrack - DFIRTrack - The Incident Response Tracking Application
Cortex - Cortex: a Powerful Observable Analysis and Active Response Engine
timesketch - Collaborative forensic timeline analysis
TheHive - TheHive: a Scalable, Open Source and Free Security Incident Response Platform
dfir-orc - Forensics artefact collection tool for systems running Microsoft Windows
MemLabs - Educational, CTF-styled labs for individuals interested in Memory Forensics
RELY - RELY (Name composed on project members Romy, Esther, Lucille and Yassir) is a python tool developed to help a Digital Forensics Triage procedure on some Microsoft Windows devices.
iris-web - Collaborative Incident Response platform
AzureHunter - A Cloud Forensics Powershell module to run threat hunting playbooks on data from Azure and O365
MemProcFS-Analyzer - MemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR