ThreatResponse / mad-kingLinks
Proof of Concept Zappa Based AWS Persistence and Attack Platform
☆40Updated 5 years ago
Alternatives and similar repositories for mad-king
Users that are interested in mad-king are comparing it to the libraries listed below
Sorting:
- Python module for evaluation of AWS account best practices around incident handling readieness.☆55Updated 5 years ago
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Updated 7 years ago
- Tools for AWS forensics☆65Updated 9 years ago
- Exfiltrate files via DNS☆94Updated 12 years ago
- ☆25Updated 7 years ago
- Things to know when DFIR occurs near a vault deployment.☆44Updated 7 years ago
- Continuous Integration and Development ExploiteR☆87Updated 3 years ago
- This script is used to generate some basic detections of the aws security services☆72Updated 3 years ago
- Basic Anomaly IDS capabilities with Python and Bro☆105Updated 7 years ago
- A simple file-based scanner to look for potential AWS access and secret keys in files☆94Updated last year
- Content for 'JIRA Risk Project' book published at LeanPub☆57Updated 7 years ago
- Web based analysis platform for use with the AWS_IR command line tool.☆17Updated 9 years ago
- Google Cloud Platform Security Tool☆235Updated 6 years ago
- AMIRA: Automated Malware Incident Response & Analysis☆151Updated 3 months ago
- Materials for the BSides NoVA/Charleston 2018 Bro Workshop☆14Updated 7 months ago
- Finding Valuable Needles in Global Source Code Haystacks with Automation☆17Updated 4 years ago
- badbucket checks your s3 bucket for common misconfigurations☆24Updated 8 years ago
- ☆14Updated 8 years ago
- All Day DevOps - Automated Infrastructure Security Monitoring and Defence (ELK + AWS Lambda)☆25Updated 9 years ago
- Terraform stack to deploy ELK Threat Hunting on Amazon AWS.☆88Updated 6 years ago
- Testing/collecting some container breakouts☆94Updated 6 years ago
- Security Operations Center Multiple Purpose Tool, takes IP address input, conducts OSINT, conducts splunk, bro, fireeye, imperva, and fir…☆22Updated 8 years ago
- Harbinger Threat Intelligence☆83Updated 10 years ago
- A collection of useful scripts☆24Updated 7 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Updated 8 years ago
- A tool to catch spoofed NBNS responses.☆51Updated 7 years ago
- Identify compromised domains or emails. A python based HIBP and HackedEmails wrapper☆38Updated 7 years ago
- Varna: Quick & Cheap AWS CloudTrail Monitoring with Event Query Language (EQL)☆52Updated 3 years ago
- A collection of useful scripts for penetration testers☆83Updated 13 years ago
- Materials from my Circle City Con talk: Fantastic OSINT (and where to find it)☆23Updated 9 years ago