CIRTKit : Tools for the Computer Incident Response Team

CIRTKit is a tools for the computer incident response team. One DFIR console to rule them all. Built on top of the Viper Framework.

Installation

Database Setup

lib/core/database.py

It requires a database to store malware artifacts and investigation data. Currently, it is equipped to use SQLite and Postgres SQL databases.

If you need to have multiple analysts collaborate on investigations, then you need to setup it to use Postgres, otherwise if you want to store information locally, you can use SQLite.

  • SQLite

For SQLite, you can simply run CIRTKit, and it will create and connect to a local SQLite file. Or you can specify the connection string to use a different file.

  • Postgres

Setup your Postgres database and edit the lines at the top of the database.py with the credentials for the database you just configured.

Also Read : Fwknop : Single Packet Authorization Port Knocking

DB_USER = ”
DB_PASSWD = ”

Install Dependencies

You can install decencies with pip (Python packaging system) using the provided requirements.txt file “pip install -r requirements.txt”

Execute

python cirtkity.py

You can also specify the ‘-i’ flag and specify a specific investigation. If it does not exist, CIRTKit will create a new investigation

Credit : Bob

R K

Recent Posts

Playwright-MCP : A Powerful Tool For Browser Automation

Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…

2 weeks ago

JBDev : A Tool For Jailbreak And TrollStore Development

JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…

2 weeks ago

Kereva LLM Code Scanner : A Revolutionary Tool For Python Applications Using LLMs

The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…

2 weeks ago

Nuclei-Templates-Labs : A Hands-On Security Testing Playground

Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…

2 weeks ago

SSH-Stealer : The Stealthy Threat Of Advanced Credential Theft

SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…

2 weeks ago

ollvm-unflattener : A Tool For Reversing Control Flow Flattening In OLLVM

Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…

2 weeks ago