A free, community-sourced, machine-readable knowledge base of digital forensic artifacts that can be used as an information source and within other tools. The artifacts are in YAML format, and Python code is used for validation. For more information, visit the project documentation at: https://artifacts.readthedocs.io/en/latest. Contributions are welcome via the developers guide or by contacting forensicartifacts@googlegroups.com. Join the Artifacts channel of Open Source DFIR Slack for discussions.
Windows event log fast forensics timeline generator and threat hunting tool.
GVfs is a userspace virtual filesystem implementation for GIO with various backends and features.
Python tool for remotely or locally dumping RAM of a Linux client for digital forensics analysis.
A comprehensive Linux log analysis tool that streamlines the investigation of security incidents by extracting and organizing critical details from supported log files.
An anti-forensic kill-switch tool for USB ports to shut down the computer immediately in case of unauthorized access.
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Stay ahead in cybersecurity. Get the week's top cybersecurity news and insights in 8 minutes or less.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
A cybersecurity platform that offers vulnerability scanning, Windows Defender and 3rd party AV management, and MFA compliance reporting, among other features.
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.