[Tools][Digital Forensics and Incident Response] Hibernation Recon

This commit is contained in:
pe3zx 2018-02-19 15:14:01 +07:00
parent fd5a2e98e4
commit 24d036f6ab

View File

@ -824,6 +824,10 @@ My curated list of awesome links, resources and tools
<td><a href="https://github.com/Cyb3rWard0g/HELK">Cyb3rWard0g/HELK</a></td>
<td>A Hunting ELK (Elasticsearch, Logstash, Kibana) with advanced analytic capabilities.</td>
</tr>
<tr>
<td><a href="https://arsenalrecon.com/weapons/hibernation-recon/">Hibernation Recon</a></td>
<td>The tools and techniques used for many years to analyze Microsoft Windows® hibernation files have left digital forensics experts in the dark… until now!</td>
</tr>
<tr>
<td><a href="https://github.com/Invoke-IR/ACE">Invoke-IR/ACE</a></td>
<td>The Automated Collection and Enrichment (ACE) platform is a suite of tools for threat hunters to collect data from many endpoints in a network and automatically enrich the data. The data is collected by running scripts on each computer without installing any software on the target. ACE supports collecting from Windows, macOS, and Linux hosts.</td>