3CORESec / TrapdoorLinks
Serverless honeytoken π΅π»ββοΈ
β81Updated 2 years ago
Alternatives and similar repositories for Trapdoor
Users that are interested in Trapdoor are comparing it to the libraries listed below
Sorting:
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.β111Updated 4 years ago
- Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/)β89Updated 2 years ago
- AWS EKS Cluster Forensicsβ23Updated 4 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.β78Updated 3 years ago
- Updated incident response generator for training classesβ44Updated 4 years ago
- Leverage the ability of Terraform and AWS or GCP to distribute large security scans across numerous cloud instances.β95Updated last year
- Automatic detection engineering technical state complianceβ55Updated last year
- defendA Data Lake. A firehose pipeline to athena providing enrichment and normalization for security eventsβ16Updated 2 years ago
- OpenIOC rules to facilitate hunting for indicators of compromiseβ37Updated 3 years ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.β56Updated 3 years ago
- Browser Shortcuts for Cyber Security Related Online Servicesβ78Updated 4 years ago
- Attack Range to test detection against nativel serverless cloud services and environmentsβ35Updated 4 years ago
- Visualize your Terraform filesβ34Updated 5 years ago
- sgCheckup generates nmap output based on scanning your AWS Security Groups for unexpected open ports.β82Updated 4 years ago
- Tools for AWS forensicsβ63Updated 9 years ago
- AWSXenos will list all the trust relationships in all the IAM roles, S3 buckets, and moreβ64Updated 7 months ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish wayβ38Updated 3 years ago
- Fun tools around the EBS Direct APIβ19Updated 4 years ago
- Visual Studio Code extension for MITRE ATT&CKβ54Updated last year
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target containerβ105Updated 6 years ago
- A tool to modify timestamps in a packet capture to a user selected dateβ31Updated 4 years ago
- A packer utility to create and capture DFIR Image for use AWS & Azureβ15Updated 6 years ago
- β18Updated 4 years ago
- Simple Docker Honeypot server emulating small snippets of the Docker HTTP APIβ31Updated 5 years ago
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.β30Updated 2 years ago
- Public release of Whalehoney Honeypotβ29Updated 3 years ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigatiβ¦β38Updated last year
- Offensive Terraform Websiteβ45Updated 5 years ago
- Materials for the BSides NoVA/Charleston 2018 Bro Workshopβ14Updated 4 months ago
- Threat intelligence and threat detection indicators (IOC, IOA)β52Updated 4 years ago