aftermath | Aftermath is a free macOS IR framework
kandi X-RAY | aftermath Summary
kandi X-RAY | aftermath Summary
aftermath is a Swift library. aftermath has no bugs, it has no vulnerabilities, it has a Permissive License and it has low support. You can download it from GitHub.
Aftermath is a Swift-based, open-source incident response framework. Aftermath can be leveraged by defenders in order to collect and subsequently analyze the data from the compromised host. Aftermath can be deployed from an MDM (ideally), but it can also run independently from the infected user's command line. Aftermath first runs a series of modules for collection. The output of this will either be written to the location of your choice, via the -o or --output option, or by default, it is written to the /tmp directory. Once collection is complete, the final zip/archive file can be pulled from the end user's disk. This file can then be analyzed using the --analyze argument pointed at the archive file. The results of this will be written to the /tmp directory. The administrator can then unzip that analysis directory and see a parsed view of the locally collected databases, a timeline of files with the file creation, last accessed, and last modified dates (if they're available), and a storyline which includes the file metadata, database changes, and browser information to potentially track down the infection vector.
Aftermath is a Swift-based, open-source incident response framework. Aftermath can be leveraged by defenders in order to collect and subsequently analyze the data from the compromised host. Aftermath can be deployed from an MDM (ideally), but it can also run independently from the infected user's command line. Aftermath first runs a series of modules for collection. The output of this will either be written to the location of your choice, via the -o or --output option, or by default, it is written to the /tmp directory. Once collection is complete, the final zip/archive file can be pulled from the end user's disk. This file can then be analyzed using the --analyze argument pointed at the archive file. The results of this will be written to the /tmp directory. The administrator can then unzip that analysis directory and see a parsed view of the locally collected databases, a timeline of files with the file creation, last accessed, and last modified dates (if they're available), and a storyline which includes the file metadata, database changes, and browser information to potentially track down the infection vector.
Support
Quality
Security
License
Reuse
Support
aftermath has a low active ecosystem.
It has 289 star(s) with 25 fork(s). There are 10 watchers for this library.
It had no major release in the last 12 months.
There are 3 open issues and 6 have been closed. On average issues are closed in 33 days. There are no pull requests.
It has a neutral sentiment in the developer community.
The latest version of aftermath is v1.2.0
Quality
aftermath has no bugs reported.
Security
aftermath has no vulnerabilities reported, and its dependent libraries have no vulnerabilities reported.
License
aftermath is licensed under the MIT License. This license is Permissive.
Permissive licenses have the least restrictions, and you can use them in most projects.
Reuse
aftermath releases are available to install and integrate.
Installation instructions are not available. Examples and code snippets are available.
Top functions reviewed by kandi - BETA
kandi's functional review helps you automatically verify the functionalities of the libraries and avoid rework.
Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of aftermath
Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of aftermath
aftermath Key Features
No Key Features are available at this moment for aftermath.
aftermath Examples and Code Snippets
No Code Snippets are available at this moment for aftermath.
Community Discussions
No Community Discussions are available at this moment for aftermath.Refer to stack overflow page for discussions.
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install aftermath
You can download it from GitHub.
Support
For any new features, suggestions and bugs create an issue on GitHub.
If you have any questions check and ask questions on community page Stack Overflow .
Find more information at:
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page