Netflix-Skunkworks / diffy
(DEPRECATED) Diffy is a triage tool used during cloud-centric security incidents, to help digital forensics and incident response (DFIR) teams quickly identify suspicious hosts on which to focus their response.
☆633Updated last year
Alternatives and similar repositories for diffy:
Users that are interested in diffy are comparing it to the libraries listed below
- Python installable command line utiltity for mitigation of host and key compromises.☆346Updated 3 years ago
- A repository for using osquery for incident detection and response☆844Updated 2 years ago
- an osquery fleet manager☆618Updated 2 years ago
- Dow Jones Hammer : Protect the cloud with the power of the cloud(AWS)☆439Updated last year
- honeyλ - a simple, serverless application designed to create and monitor fake HTTP endpoints (i.e. URL honeytokens) automatically, on top…☆517Updated 6 years ago
- Enforce ownership and data security within AWS☆449Updated 4 years ago
- Fetch all public IP addresses tied to your AWS account. Works with IPv4/IPv6, Classic/VPC networking, and across all AWS services☆641Updated 3 years ago
- Google Cloud Platform Security Tool☆234Updated 5 years ago
- for AWS Security material☆247Updated 3 years ago
- BinaryAlert: Serverless, Real-time & Retroactive Malware Detection.☆1,424Updated last year
- A tool to help forensicate offline docker acquisitions☆540Updated 6 months ago
- A flexible control server for osquery fleets☆1,105Updated 4 years ago
- goSDL☆525Updated 2 years ago
- Remote Memory Acquisition Tool☆245Updated 4 years ago
- AWS Security Tools (AST) in a simple Docker container.☆287Updated 3 years ago
- A collection of AWS penetration testing junk☆1,191Updated last year
- Incident Response Forensic Framework☆600Updated 5 years ago
- Security auditing tool for AWS environments☆1,730Updated 6 years ago
- Aardvark is a multi-account AWS IAM Access Advisor API☆476Updated 5 months ago
- barq: The AWS Cloud Post Exploitation framework!☆387Updated 2 years ago
- Python-based utility that uses supervised machine learning to detect phishing domains from the Certificate Transparency log network.☆323Updated 7 months ago
- An information security preparedness tool to do adversarial simulation.☆1,121Updated 6 years ago
- Collection of scripts and resources for DevSecOps and Automated Incident Response Security☆626Updated 4 years ago
- The main project for the Unfetter-Discover application. This is the project that will hold the configuration files, the docker-compose f…☆412Updated 2 years ago
- CloudTracker helps you find over-privileged IAM users and roles by comparing CloudTrail logs with current IAM policies.☆896Updated 3 years ago
- Tools for fingerprinting and exploiting Amazon cloud infrastructures☆468Updated 2 years ago
- AWS Auditing & Hardening Tool☆711Updated 5 years ago
- Cloud Security Suite - One stop tool for auditing the security posture of AWS/GCP/Azure infrastructure.☆1,154Updated 2 years ago
- a ruggedization framework that embodies the principle "be mean to your code"☆988Updated 2 years ago
- AWS Least Privilege for Distributed, High-Velocity Deployment☆1,133Updated last year