Add: XForceIR/SideLoadHunter to DFIR Section

This commit is contained in:
pe3zx 2021-09-06 14:47:55 +07:00
parent af64e7b7a3
commit c6ce3ad6a2

View File

@ -1665,6 +1665,10 @@ This repository is created as an online bookmark for useful links, resources and
<td><a href="https://github.com/williballenthin/process-forest">williballenthin/process-forest</a></td> <td><a href="https://github.com/williballenthin/process-forest">williballenthin/process-forest</a></td>
<td>process-forest is a tool that processes Microsoft Windows EVTX event logs that contain process accounting events and reconstructs the historical process heirarchies.</td> <td>process-forest is a tool that processes Microsoft Windows EVTX event logs that contain process accounting events and reconstructs the historical process heirarchies.</td>
</tr> </tr>
<tr>
<td><a href="https://github.com/XForceIR/SideLoadHunter">XForceIR/SideLoadHunter</a></td>
<td>SideLoadHunter is a PowerShell script and Sysmon configuration designed to aide defenders and incident responders identify evidence of DLL sideloading on Windows systems.</td>
</tr>
<tr> <tr>
<td><a href="https://github.com/yampelo/beagle">yampelo/beagle</a></td> <td><a href="https://github.com/yampelo/beagle">yampelo/beagle</a></td>
<td>Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.</td> <td>Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.</td>