From aa6a76b2fe18f19d941fb4774cb01e7d34b700f3 Mon Sep 17 00:00:00 2001 From: Explie Date: Wed, 28 Oct 2020 13:48:58 +0100 Subject: [PATCH] Removing binforray, no longer available Replaced by https://ericzimmerman.github.io/ --- README.md | 1 - 1 file changed, 1 deletion(-) diff --git a/README.md b/README.md index 760513a..02ba870 100644 --- a/README.md +++ b/README.md @@ -238,7 +238,6 @@ Digital Forensics and Incident Response (DFIR) teams are groups of people in an ### Windows Evidence Collection * [AChoir](https://github.com/OMENScan/AChoir) - Framework/scripting tool to standardize and simplify the process of scripting live acquisition utilities for Windows. -* [Binaryforay](http://binaryforay.blogspot.co.il/p/software.html) - List of free tools for win forensics (http://binaryforay.blogspot.co.il/). * [Crowd Response](http://www.crowdstrike.com/community-tools/) - Lightweight Windows console application designed to aid in the gathering of system information for incident response and security engagements. It features numerous modules and output formats. * [DFIR ORC](https://dfir-orc.github.io/) - DFIR ORC is a collection of specialized tools dedicated to reliably parse and collect critical artefacts such as the MFT, registry hives or event logs. DFIR ORC collects data, but does not analyze it: it is not meant to triage machines. It provides a forensically relevant snapshot of machines running Microsoft Windows. The code can be found on [GitHub](https://github.com/DFIR-ORC/dfir-orc). * [FastIR Collector](https://github.com/SekoiaLab/Fastir_Collector) - Tool that collects different artefacts on live Windows systems and records the results in csv files. With the analyses of these artefacts, an early compromise can be detected.