Cross-platform forensic tools for incident response investigations.
.
├── Linux/ # Linux-specific forensic tools
├── MacOS/ # macOS investigation scripts
├── Windows/ # Windows forensic utilities
├── CrossPlatform/ # Tools working across OSes
└── README.md # This documentation
Capture physical memory using LiME kernel module
sudo ./lime_ram_capture.sh -o memdump.lime -f rawGenerate filesystem timeline sorted by modification time
sudo ./timeline_generator.sh -d /var/log -o var_log_timeline.csvAdvanced process inspection and analysis
python3 process_analyzer.py --pid 1234 # Analyze specific process
python3 process_analyzer.py --all --csv processes.csv # System-wide auditNetwork connection forensic analysis
sudo ./net_forensics.sh -p tcp -o network_report.txtRootkit detection and kernel module verification
sudo ./rootkit_check.sh --full-scan --report rootkit_scan.logComprehensive evidence collection
sudo ./triage_collector.sh --memory --network --output /mnt/evidenceMain Linux triage workflow controller
sudo ./investigation.sh --case CASE123 --preserve-memory --log-level debugCollects Safari browsing history and downloads
./browser_artifact_collector.sh --output-dir /evidence # Custom output directorySearch file metadata for IOCs using Spotlight
swift spotlight_search.swift -i ioc_list.txt # Search using predefined IOC listAnalyze launch agents/daemons and login items
swift startup_check.swift --json # Output in JSON format
swift startup_check.swift --compare-snapshot baseline.json # Compare to known good stateCollect unified logging system data
sudo ./log_collector.sh --timeframe "last 24h" # Collect logs from specific periodFile integrity checker using mtree format
./mtree_checker.sh create # Create baseline
./mtree_checker.sh verify # Check against baselineMain macOS triage workflow controller
sudo ./investigation.sh --case CASE456 --collect-memoryAnalyze and correlate Windows Event Logs
.\eventlog_analyzer.ps1 -Channel Security -EventID 4624,4625 -Output report.csvAudit auto-start locations and scheduled tasks
.\autorun_audit.ps1 -VerifyCertificates -HashAlgorithm SHA256Detect WMI-based persistence mechanisms
.\wmi_persistence_check.ps1 -DeepScan -OutputJSON persistence_objects.jsonAnalyze Prefetch file execution history
.\prefetch_analyzer.ps1 -Timeline -LastAccessTime "2025-04-28"Advanced threat hunting module
.\hunter.ps1 -Indicator Process -Name "malware.exe" -KillProcessWindows triage workflow controller
.\investigation.ps1 -FullSystemScan -OutputDirectory .\evidenceConvert Windows FILETIME timestamps
python filetimeconverter.py 133490699610000000
# Output: 2025-04-29 16:46:01 UTCMalware detection using YARA rules
python yara_scanner.py suspicious_file.exeEC2 forensic snapshot tool
python aws_incident_response.py i-1234567890abcdef0 us-west-2# Install Python requirements
pip install -r requirements.txt
# System packages
brew install yara # macOS
sudo apt install yara libyara-dev # Linux- Clone repository
git clone https://github.com/Kirubakaranj/IncidentResponse
cd IncidentResponse- Install dependencies
pip install -r requirements.txt # Python tools- Update YARA rules
# Add custom rules to CrossPlatform/yara_rules/Add new tools to appropriate platform directory and update this README.