Netflix-Skunkworks / diffyLinks
(DEPRECATED) Diffy is a triage tool used during cloud-centric security incidents, to help digital forensics and incident response (DFIR) teams quickly identify suspicious hosts on which to focus their response.
☆634Updated last year
Alternatives and similar repositories for diffy
Users that are interested in diffy are comparing it to the libraries listed below
Sorting:
- Python installable command line utiltity for mitigation of host and key compromises.☆345Updated 3 years ago
- Dow Jones Hammer : Protect the cloud with the power of the cloud(AWS)☆442Updated last year
- A repository for using osquery for incident detection and response☆853Updated 2 years ago
- an osquery fleet manager☆618Updated 2 years ago
- Remote Memory Acquisition Tool☆247Updated 4 years ago
- Fetch all public IP addresses tied to your AWS account. Works with IPv4/IPv6, Classic/VPC networking, and across all AWS services☆641Updated 4 years ago
- honeyλ - a simple, serverless application designed to create and monitor fake HTTP endpoints (i.e. URL honeytokens) automatically, on top…☆517Updated 6 years ago
- CloudTracker helps you find over-privileged IAM users and roles by comparing CloudTrail logs with current IAM policies.☆900Updated 3 years ago
- Google Cloud Platform Security Tool☆234Updated 5 years ago
- AWS Least Privilege for Distributed, High-Velocity Deployment☆1,137Updated last year
- Aardvark is a multi-account AWS IAM Access Advisor API☆479Updated 8 months ago
- Enforce ownership and data security within AWS☆449Updated 4 years ago
- Collection of scripts and resources for DevSecOps and Automated Incident Response Security☆626Updated 4 years ago
- Cloud Security Suite - One stop tool for auditing the security posture of AWS/GCP/Azure infrastructure.☆1,161Updated 2 years ago
- AWS Security Tools (AST) in a simple Docker container.☆286Updated 4 years ago
- BinaryAlert: Serverless, Real-time & Retroactive Malware Detection.☆1,427Updated last year
- A graph-based tool for visualizing effective access and resource relationships in AWS environments.☆962Updated 2 years ago
- An information security preparedness tool to do adversarial simulation.☆1,124Updated 6 years ago
- Python-based utility that uses supervised machine learning to detect phishing domains from the Certificate Transparency log network.☆323Updated 9 months ago
- Open Cloud Security Posture Management Engine☆341Updated 3 years ago
- Security auditing tool for AWS environments☆1,730Updated 6 years ago
- for AWS Security material☆248Updated 3 years ago
- A tool to help forensicate offline docker acquisitions☆545Updated 8 months ago
- A collection of AWS penetration testing junk☆1,199Updated last year
- Dashboard to collect, analyze, and respond to reported phishing emails.☆291Updated last year
- The main project for the Unfetter-Discover application. This is the project that will hold the configuration files, the docker-compose f…☆414Updated 2 years ago
- A flexible control server for osquery fleets☆1,105Updated 4 years ago
- AWS Auditing & Hardening Tool☆710Updated 5 years ago
- Parse and Process AWS IAM Policies, Statements, ARNs, and wildcards.☆443Updated last year
- A UNIX security auditing tool based on several security frameworks☆315Updated 3 weeks ago