Skip to content

thePidge/artifacts

 
 

Repository files navigation

ForensicArtifacts.com Artifact Repository Build Status

A free, community-sourced, machine-readable knowledge base of forensic artifacts that the world can use both as an information source and within other tools.

If you'd like to use the artifacts in your own tools, all you need to be able to do is read YAML. That's it. No other dependencies. The python code in this project is just used to validate all the artifacts to make sure they follow the spec.

Artifact Definitions

The artifact definitions are in the definitions directory and the format is described in detail in the Style Guide.

As of 2015-11-20 the repository contains:

File paths covered 487
Registry keys covered 289
Total artifacts 345

Artifacts by type

ARTIFACT COMMAND DIRECTORY FILE PATH REGISTRY_KEY REGISTRY_VALUE WMI
14 6 11 191 4 38 65 16

Artifacts by OS

Darwin Linux Windows
106 75 177

Artifacts by label

Antivirus Authentication Browser Cloud Cloud Storage Configuration Files External Media ExternalAccount IM Logs Mail Network Software System Users iOS
6 12 18 2 3 34 2 3 4 27 12 7 35 62 59 5

Background/History

The ForensicArtifacts.com artifact repository was forked from the GRR project artifact collection into a stand-alone repository that is not tool-specific. The GRR developers have migrated to using this repository and make contributions here. In addition the ForensicArtifact team will begin backfilling artifacts in the new format from the ForensicArtifacts.com website.

For some background on the artifacts system and how we expect it to be used see this blackhat presentation and youtube video from the GRR team.

Contributing

Please send us your contribution! See the developers guide for instructions.

External links

Contact

[email protected]

About

ForensicArtifacts.com Artifact Repository

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages

  • Python 92.5%
  • Shell 4.7%
  • Makefile 2.8%