CyLR
GPL-3.0๐ฌ Digital Forensics ยท C#
CyLR is a live response tool designed for quickly collecting forensic artifacts from hosts during incident response activities. It supports the extraction of key data such as registry hives, event logs, and memory captures, which are vital for triaging security incidents. By automating the collection process, CyLR enables responders to gather evidence efficiently without impacting system performance. Its ease of use and comprehensive artifact collection make it valuable for rapid incident response.
Tags
Details
- Category
- ๐ฌ Digital Forensics
- Language
- C#
- Repository
- orlikoski/CyLR
- License
- GPL-3.0
- Platforms
- ๐ชwindows๐งlinux๐macos
Links
Alternatives & Comparisons
More in Digital Forensics
Volatility 3
PythonAdvanced memory forensics framework. Extracts artifacts from RAM dumps - processes, network connections, registry.
Autopsy
JavaDigital forensics platform with GUI. Disk image analysis, timeline analysis, keyword search, hash filtering.
Ghidra
JavaNSA's reverse engineering framework. Disassembly, decompilation, graphing, and scripting for binary analysis.
Binwalk
PythonFirmware analysis tool. Searches binary images for embedded files, executables, and file systems.
YARA
CPattern matching swiss knife for malware researchers. Create rules to identify and classify malware samples.
Velociraptor
GoEndpoint visibility and collection tool. Hunt for artifacts across thousands of endpoints simultaneously.