Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/securityjoes/ForensicMiner

A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.
https://github.com/securityjoes/ForensicMiner

automation cortex crowdstrike cyber dfir edr fast forensics ir mdr powershell security soc xdr

Last synced: about 2 months ago
JSON representation

A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.

Awesome Lists containing this project

README

        

# ForensicMiner v1.4
#### "ForensicMiner, Redefine DFIR Automations"
#### Created & Maintained by: [Eilay Yosfan](https://github.com/YosfanEilay#-eilay-yosfan)
![Banner](https://github.com/YosfanEilay/ForensicMiner/assets/132997318/72d572fc-2f43-48dd-a16b-1b545eb6aad6)

## What is ForensicMiner ?
ForensicMiner, a PowerShell-based DFIR automation tool, revolutionizes the field of digital investigations.
Designed for efficiency, it automates artifact and evidence collection from Windows machines. Compatibility
with Flacon Crowdstrike RTR and Palo Alto Cortex XDR Live Terminal, along with its swift performance and
user-friendly interface, makes ForensicMiner an indispensable asset for investigators navigating the complexities
of forensic analysis. Streamlined and effective, this tool sets a new standard in the realm of digital forensics.

## How To Install ?
![How To Install](https://github.com/YosfanEilay/ForensicMiner/assets/132997318/36c30bc3-c9f1-49f7-a3ac-b56c01e53dd1)

#### Know This Before Installation
* Always install ForensicMiner on "C:\" drive.
* Always run ForensicMiner as administrator, if not, some things may not work properly.
* Don't run the tool using Windows PowerShell (x86)! if you do, some things may not work properly.
* Make sure your PowerShell Execution Policy is on Bypass, if not, scripts could not run on your system.
* For more information use this PS Execution Policy Guide - https://www.youtube.com/watch?v=L0fgZ0FJIv0

#### Installation Process - Text Guide
1. In this GitHub repository, click on "<> Code," and then select "Download ZIP."
2. Extract "ForensicMiner" folder from "ForensicMiner-main.zip".
3. Move "ForensicMiner" folder to C:\\ drive.
5. That's it! ForensicMiner is now installed. Enjoy

#### Installation Process - Video Guide
https://github.com/YosfanEilay/ForensicMiner/assets/132997318/e163abfe-0a60-4181-806a-2426cbe26711

### How To Install On Falcon Crowdstrike ?
#### Installation Process On - Falcon Crowdstrike RTR - Video Guide
https://github.com/YosfanEilay/ForensicMiner/assets/132997318/c0be8264-fc0f-47fc-83ad-fe3e5edf5056

### How To Install On Palo Alto Cortex XDR ?
### Installation Process On - Palo Alto Cortex XDR - Video Guide
https://github.com/YosfanEilay/ForensicMiner/assets/132997318/397f3e3c-d271-4fd3-8ed5-2072a28d1395

## Quick Start Guide - How To Use ForensicMiner ?
https://github.com/YosfanEilay/ForensicMiner/assets/132997318/0f32bc7c-b4fe-4ac5-88cb-09ea701878bd
After installing ForensicMiner on the machine using the execution of "FM-Extractor.ps1"

A new folder should be created on the "C:\" drive, called "ForensicMiner".



Navigate to This folder using the following command:
```
PS C:\> cd ForensicMiner
```
And now you can execute ForensicMiner menu page to view all available features and options using this command:
```
PS C:\ForensicMiner> .\ForensicMiner.ps1 -O Menu
```
#### Show Menu - Video Guide
https://github.com/YosfanEilay/ForensicMiner/assets/132997318/163c6656-cc14-439c-bc7a-f775d175dd73

### Running Feature Example - RunMRU
In this example you will see how ForensicMiner manage to collect all the Run.exe execution history

of all the users (Online or Offline) in the machine and log them under "C:\ForensicMiner\MyEvidence"

https://github.com/YosfanEilay/ForensicMiner/assets/132997318/043674b4-20ca-45e2-9ca6-f2218350862a

## Credits Section
| Name | Why is the credit ? |
| ------------------------------------ | -------------------------------------------- |
| Ido Naor, Security Joes CEO | For supporting this project |
| Warren Frame (RamblingCookieMonster) | Using Warre's PSSQLite in ForensicMiner |
| Jan Moronia & Felipe Duarte | Helping to manage time spent on this project |
| Nir Avron | For letting me test on his machine |