Downloads

Free artifact references, query packs, acquisition guides, and starter kits generated from DFIR Assist content. All files are Markdown or YAML for easy integration into your workflow.

28 downloads across 4 categories

Artifact References

6 of 13

Windows Forensic Artifacts Reference

Complete reference guide for Windows forensic artifacts including registry, event logs, filesystem, and execution evidence.

Windows
MD~25 KBv1.0

Linux Forensic Artifacts Reference

Complete reference guide for Linux forensic artifacts including auth logs, systemd journal, Docker, and filesystem evidence.

Linux
MD~18 KBv1.0

macOS Forensic Artifacts Reference

Complete reference guide for macOS forensic artifacts including unified log, FSEvents, spotlight, and keychain evidence.

macOS
MD~18 KBv1.0

Microsoft 365 & Azure Forensic Artifacts Reference

Complete reference guide for Microsoft 365 and Azure forensic artifacts including UAL, Azure AD, and mailbox audit.

Cloud & SaaS
m365azure
MD~15 KBv1.0

AWS Cloud Forensic Artifacts Reference

Reference guide for AWS forensic artifacts including CloudTrail, IAM, STS, GuardDuty, EC2, EKS, and VPC telemetry.

Cloud & SaaS
awscloudtraileksecrec2iamstsguarddutyssmvpc-flowroute53-dns
MD~18 KBv1.0

Google Workspace Forensic Artifacts Reference

Reference guide for Google Workspace forensic artifacts including admin, login, Gmail, Drive, OAuth, Takeout, and Vault evidence.

Cloud & SaaS
google-workspace
MD~16 KBv1.0

Query Packs

2

KQL Query Pack

Collection of KQL queries extracted from all runbook procedures for Microsoft Sentinel and Defender.

WindowsCloud & SaaS
YAML~20 KBv1.0

SPL Query Pack

Collection of Splunk SPL queries extracted from all runbook procedures for threat hunting and investigation.

WindowsLinuxNetwork
YAML~18 KBv1.0

Acquisition Guides

5

Windows Acquisition Guide

Step-by-step guide for acquiring forensic evidence from Windows systems including disk, memory, triage, and remote methods.

Windows
MD~15 KBv1.0

Linux Acquisition Guide

Step-by-step guide for acquiring forensic evidence from Linux systems including disk, memory, container, and cloud methods.

Linux
MD~15 KBv1.0

macOS Acquisition Guide

Step-by-step guide for acquiring forensic evidence from macOS systems including Target Disk Mode, memory, and remote methods.

macOS
MD~10 KBv1.0

iOS Acquisition Guide

Step-by-step guide for acquiring forensic evidence from iOS devices including physical, logical, and cloud methods.

iOS
MD~8 KBv1.0

Android Acquisition Guide

Step-by-step guide for acquiring forensic evidence from Android devices including ADB, chip-off, and JTAG methods.

Android
MD~8 KBv1.0

Starter Kits

4 of 8

Ransomware Starter Kit

Complete starter bundle for ransomware incidents: cheatsheet, relevant artifacts, and query pack combined.

WindowsLinuxNetwork
MD~35 KBv1.0

Phishing Starter Kit

Complete starter bundle for phishing incidents: cheatsheet, M365 artifacts, and email investigation queries.

Cloud & SaaSWindows
MD~30 KBv1.0

Data Exfiltration Starter Kit

Complete starter bundle for data exfiltration incidents: cheatsheet, network artifacts, and DLP queries.

WindowsNetwork
MD~30 KBv1.0

Insider Threat Starter Kit

Complete starter bundle for insider threat investigations: cheatsheet, user activity artifacts, and monitoring queries.

WindowsCloud & SaaS
MD~28 KBv1.0