Downloads
Free artifact references, query packs, acquisition guides, and starter kits generated from DFIR Assist content. All files are Markdown or YAML for easy integration into your workflow.
28 downloads across 4 categories
Artifact References
6 of 13Windows Forensic Artifacts Reference
Complete reference guide for Windows forensic artifacts including registry, event logs, filesystem, and execution evidence.
Linux Forensic Artifacts Reference
Complete reference guide for Linux forensic artifacts including auth logs, systemd journal, Docker, and filesystem evidence.
macOS Forensic Artifacts Reference
Complete reference guide for macOS forensic artifacts including unified log, FSEvents, spotlight, and keychain evidence.
Microsoft 365 & Azure Forensic Artifacts Reference
Complete reference guide for Microsoft 365 and Azure forensic artifacts including UAL, Azure AD, and mailbox audit.
AWS Cloud Forensic Artifacts Reference
Reference guide for AWS forensic artifacts including CloudTrail, IAM, STS, GuardDuty, EC2, EKS, and VPC telemetry.
Google Workspace Forensic Artifacts Reference
Reference guide for Google Workspace forensic artifacts including admin, login, Gmail, Drive, OAuth, Takeout, and Vault evidence.
Query Packs
2KQL Query Pack
Collection of KQL queries extracted from all runbook procedures for Microsoft Sentinel and Defender.
SPL Query Pack
Collection of Splunk SPL queries extracted from all runbook procedures for threat hunting and investigation.
Acquisition Guides
5Windows Acquisition Guide
Step-by-step guide for acquiring forensic evidence from Windows systems including disk, memory, triage, and remote methods.
Linux Acquisition Guide
Step-by-step guide for acquiring forensic evidence from Linux systems including disk, memory, container, and cloud methods.
macOS Acquisition Guide
Step-by-step guide for acquiring forensic evidence from macOS systems including Target Disk Mode, memory, and remote methods.
iOS Acquisition Guide
Step-by-step guide for acquiring forensic evidence from iOS devices including physical, logical, and cloud methods.
Android Acquisition Guide
Step-by-step guide for acquiring forensic evidence from Android devices including ADB, chip-off, and JTAG methods.
Starter Kits
4 of 8Ransomware Starter Kit
Complete starter bundle for ransomware incidents: cheatsheet, relevant artifacts, and query pack combined.
Phishing Starter Kit
Complete starter bundle for phishing incidents: cheatsheet, M365 artifacts, and email investigation queries.
Data Exfiltration Starter Kit
Complete starter bundle for data exfiltration incidents: cheatsheet, network artifacts, and DLP queries.
Insider Threat Starter Kit
Complete starter bundle for insider threat investigations: cheatsheet, user activity artifacts, and monitoring queries.