Pinned Repositories
atomic-red-team
Small and highly portable detection tests based on MITRE's ATT&CK.
awesome-forensics
A curated list of awesome forensic analysis tools and resources
fmem
Linux Kernel Module designed to help analyze volatile memory in the linux kernel
invoke-atomicredteam
Invoke-AtomicRedTeam is a PowerShell module to execute tests as defined in the [atomics folder](https://github.com/redcanaryco/atomic-red-team/tree/master/atomics) of Red Canary's Atomic Red Team project.
IR_Tool
Script for Forensic on Linux
LinuxCatScale
Incident Response collection and processing scripts with automated reporting scripts
python-evtx
Pure Python parser for recent Windows Event Log files (.evtx)
round4test
Slides
SysScout
SysScout is a fully encapsulated script that quickly and easily pulls local machine information from Linux-Based systems. A simple, easy to use Incident Response and Network Forensics tool that doesn't require installation of dependencies and/or additional toolkits.
crav3r's Repositories
crav3r/atomic-red-team
Small and highly portable detection tests based on MITRE's ATT&CK.
crav3r/awesome-forensics
A curated list of awesome forensic analysis tools and resources
crav3r/invoke-atomicredteam
Invoke-AtomicRedTeam is a PowerShell module to execute tests as defined in the [atomics folder](https://github.com/redcanaryco/atomic-red-team/tree/master/atomics) of Red Canary's Atomic Red Team project.
crav3r/fmem
Linux Kernel Module designed to help analyze volatile memory in the linux kernel
crav3r/IR_Tool
Script for Forensic on Linux
crav3r/LinuxCatScale
Incident Response collection and processing scripts with automated reporting scripts
crav3r/python-evtx
Pure Python parser for recent Windows Event Log files (.evtx)
crav3r/round4test
crav3r/Slides
crav3r/SysScout
SysScout is a fully encapsulated script that quickly and easily pulls local machine information from Linux-Based systems. A simple, easy to use Incident Response and Network Forensics tool that doesn't require installation of dependencies and/or additional toolkits.