Skip to content
#

forensic-analysis

Here are 91 public repositories matching this topic...

beagle
alishasonawalla
alishasonawalla commented Apr 26, 2019

There is a broken link in the README.md file, in the sentence that reads:

Right clicking on a node exposes a context menu that allows you to run graph mutators.

It appears that the word graph mutators in the above sentence is intended to link to a mutators.md file under docs. But it seems that no such file exists. Is there another document it should be pointing to? Let me know if I ca

bug

This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team member to extract juicy information such as LAPS passwords or any sensitive information on the screen. Blue Team member can reconstruct PNG files to see what an attacker did on a compromised host. It is extremely useful for a forensics team to extract timestamps after an attack on a host to collect evidences and perform further analysis.

  • Updated Aug 4, 2018
  • Python

UAC (Unix-like Artifacts Collector) is a command line shell script that makes use of built-in tools to automate the collection of Unix-like systems artifacts. The script respects the order of volatility and artifacts that are changed during the execution. Supported systems: AIX, BSD, Linux, macOS and Solaris.

  • Updated Jun 16, 2020
  • Shell

Improve this page

Add a description, image, and links to the forensic-analysis topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the forensic-analysis topic, visit your repo's landing page and select "manage topics."

Learn more

You can’t perform that action at this time.