(DEPRECATED) Diffy is a triage tool used during cloud-centric security incidents, to help digital forensics and incident response (DFIR) teams quickly identify suspicious hosts on which to focus their response.
☆629Jan 11, 2024Updated 2 years ago
Alternatives and similar repositories for diffy
Users that are interested in diffy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Marking instances dirty since 2018☆47Apr 25, 2019Updated 7 years ago
- AWS Least Privilege for Distributed, High-Velocity Deployment☆1,144Nov 24, 2025Updated 5 months ago
- Security Monkey monitors AWS, GCP, OpenStack, and GitHub orgs for assets and their changes over time.☆4,374Feb 11, 2021Updated 5 years ago
- Automation and Scaling of Digital Forensics Tools☆790Updated this week
- Python installable command line utiltity for mitigation of host and key compromises.☆345Jul 23, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- BinaryAlert: Serverless, Real-time & Retroactive Malware Detection.☆1,450Dec 12, 2023Updated 2 years ago
- Proof of concept incident response demo using SSM and AWS Fargate.☆15Dec 5, 2019Updated 6 years ago
- Remote Memory Acquisition Tool☆253Sep 22, 2020Updated 5 years ago
- Aardvark is a multi-account AWS IAM Access Advisor API☆484Oct 25, 2024Updated last year
- CloudTracker helps you find over-privileged IAM users and roles by comparing CloudTrail logs with current IAM policies.☆912Dec 17, 2021Updated 4 years ago
- Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.☆1,345Dec 13, 2022Updated 3 years ago
- ☆83Dec 5, 2019Updated 6 years ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,559Jan 12, 2026Updated 4 months ago
- GRR Rapid Response: remote live forensics for incident response☆5,065May 12, 2026Updated last week
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Collaborative forensic timeline analysis☆3,335Updated this week
- DFIRTrack - The Incident Response Tracking Application☆534Jan 13, 2026Updated 4 months ago
- An information security preparedness tool to do adversarial simulation.☆1,139Apr 1, 2019Updated 7 years ago
- A Linux Auditd rule set mapped to MITRE's Attack Framework☆824Jul 8, 2020Updated 5 years ago
- A desktop application that checks security-related settings and makes recommendations for improvements without requiring central device m…☆464Sep 6, 2023Updated 2 years ago
- List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.☆9,450Apr 17, 2026Updated last month
- ☆159Jul 8, 2023Updated 2 years ago
- PowerForensics provides an all in one platform for live disk forensic analysis☆1,433Nov 16, 2023Updated 2 years ago
- Cartography is a Python tool that pulls infrastructure assets and their relationships into a Neo4j graph database.☆3,889Updated this week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆377Feb 23, 2024Updated 2 years ago
- Fast Incident Response☆2,010May 6, 2026Updated 2 weeks ago
- StreamAlert is a serverless, realtime data analysis framework which empowers you to ingest, analyze, and alert on data from any environme…☆2,887Oct 23, 2023Updated 2 years ago
- CloudMapper helps you analyze your Amazon Web Services (AWS) environments.☆6,278Jul 15, 2024Updated last year
- A repository for using osquery for incident detection and response☆894Sep 8, 2025Updated 8 months ago
- Enforce ownership and data security within AWS☆447Oct 7, 2020Updated 5 years ago
- Your Everyday Threat Intelligence☆1,982Updated this week
- Parse and Process AWS IAM Policies, Statements, ARNs, and wildcards.☆445Jun 21, 2024Updated last year
- Forensics acquisition framework designed to be extensible and secure☆126Jun 21, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Automated Attack Simulation in the Cloud, complete with detection use cases.☆612Nov 28, 2024Updated last year
- AWS IAM linting library☆1,115Jan 7, 2026Updated 4 months ago
- Collection of scripts and resources for DevSecOps and Automated Incident Response Security☆633Jan 14, 2026Updated 4 months ago
- Dow Jones Hammer : Protect the cloud with the power of the cloud(AWS)☆449Jul 17, 2023Updated 2 years ago
- TheHive is a Collaborative Case Management Platform, now distributed as a commercial version☆3,916Jul 25, 2025Updated 9 months ago
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆5,194Updated this week
- A tool for quickly evaluating IAM permissions in AWS.☆1,552Aug 2, 2024Updated last year