Home

Awesome

<div align="center"> <img style="padding:0;vertical-align:bottom;" height="158" width="311" src="/images/BSF.png"/> <p> <h2> CyberPipe v5 </h2> <h5> An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations. </h5> <p> <p> </div> <div align="center"> <img style="padding:0;vertical-align:bottom;" height="340" width="526" src="/images/Screenshot.png"/> <div align="left"> <h5> Functions: </h5>

*There are collection profiles available for:

<h5> Prerequisites: </h5>
<h5> Network Collections: </h5>

CyberPipe 5 also has the capability to write captures to a network repository. Just un-comment # the Network section and update the \\server\share line to reflect your environment.

In this configuration it can be included as part of automation functions like a collection being triggered from an event logged on the EDR.

<h5> Prior version (KAPE support): </h5>

If you're a prior user of CyberPipe and want to use the previous method where KAPE facilitates the collection with the MAGNET tools, or have made other KAPE modifications, use v4.01 CyberPipe.v4.01.ps1

Note: this script was previously titled CSIRT-Collect. Project name and repo updated with version 4.0.

For more information visit BakerStreetForensics.com