forensicate.net

notes from the trenches

UTC

Resources

A non-exhaustive list of resources worth checking out.

Cheatsheets

Books

Tooling

  • SIFT Workstation SANS-curated Ubuntu distribution preloaded with open-source incident response and forensic tools.
  • Sysinternals Microsoft's suite of Windows internals utilities, including Process Explorer, Autoruns, Sysmon, etc.
  • Velociraptor Endpoint visibility and DFIR platform.
  • FTK Imager Free disk imaging and evidence preview utility from Exterro.
  • Arsenal Recon Arsenal Image Mounter and other utilities for mounting forensic images, shadow copies, and accessing registry artifacts.
  • Magnet Forensics Commercial forensics vendor with a range of free utilities (like Encrypted Disk Detector, RAM capture, etc.) alongside its paid platform.
  • KAPE Kroll Artifact Parser and Extractor. Targeted collection and parsing of forensic artifacts, built on Eric Zimmerman's tools.
  • Eric Zimmerman's Tools Windows artifact parsing at scale (Registry, Prefetch, Jump Lists, etc.).
  • Plaso Python backend behind log2timeline for building super timelines from many artifact sources.
  • Chainsaw Fast Windows event log hunting using Sigma rules and built-in detection signatures.
  • Hayabusa Windows event log fast-forensics and threat hunting tool with Sigma rule support.
  • Didier Stevens Suite Python tools for analyzing PDFs, Office documents, OLE streams, shellcode, and suspicious binaries.

Threat intelligence

  • The DFIR Report Detailed intrusion case studies with full attack chains, TTPs, and artifacts observed in the wild.
  • Palo Alto Unit 42 Threat research covering APT reporting, ransomware analysis, and novel vulnerabilities.
  • CISA Known Exploited Vulnerabilities Authoritative catalog of vulnerabilities known to be actively exploited in the wild.
  • LOTL LOLBAS Windows binaries, scripts, and libraries that attackers abuse for living-off-the-land techniques.
  • LOTL GTFOBins Unix binaries that can be abused to bypass local security restrictions, escalate privileges, or spawn shells.
  • LOTL LOOBins macOS counterpart to LOLBAS, cataloging built-in binaries attackers use for stealthy operations.
  • LOTL LOTS Project Catalog of legitimate trusted sites abused for C2, phishing, exfiltration, and payload hosting.

Blogs

  • Windows Incident Response Harlan Carvey's long-running blog on Windows incident response, registry forensics, and analyst methodology.
  • OSDFIR Open source DFIR tooling updates and guidance, covering Plaso, Timesketch, GRR, Turbinia, and related projects.
  • Brett Shavers' Blog Commentary on investigative methodology, digital forensics practice, and career development from the author of several DFIR books.
  • DFIR Philosophy Posts on investigative mindset, analyst development, and the craft of DFIR.
  • Forensic IT Guy Tony Lambert's blog on malware analysis, reverse engineering, and threat research.