ThreatResponse / mad-kingLinks
Proof of Concept Zappa Based AWS Persistence and Attack Platform
☆40Updated 5 years ago
Alternatives and similar repositories for mad-king
Users that are interested in mad-king are comparing it to the libraries listed below
Sorting:
- Python module for evaluation of AWS account best practices around incident handling readieness.☆55Updated 5 years ago
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Updated 7 years ago
- This script is used to generate some basic detections of the aws security services☆71Updated 3 years ago
- Exfiltrate files via DNS☆95Updated 12 years ago
- Continuous Integration and Development ExploiteR☆87Updated 2 years ago
- Things to know when DFIR occurs near a vault deployment.☆43Updated 7 years ago
- ☆25Updated 6 years ago
- Basic Anomaly IDS capabilities with Python and Bro☆105Updated 7 years ago
- Google Cloud Platform Security Tool☆234Updated 6 years ago
- Tools for AWS forensics☆64Updated 9 years ago
- ☆67Updated 8 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Updated 8 years ago
- Content for 'JIRA Risk Project' book published at LeanPub☆57Updated 7 years ago
- Testing/collecting some container breakouts☆94Updated 6 years ago
- A simple file-based scanner to look for potential AWS access and secret keys in files☆93Updated last year
- AMIRA: Automated Malware Incident Response & Analysis☆151Updated last month
- ☆61Updated 7 years ago
- Security Operations Center Multiple Purpose Tool, takes IP address input, conducts OSINT, conducts splunk, bro, fireeye, imperva, and fir…☆21Updated 8 years ago
- A collection of useful scripts for penetration testers☆83Updated 13 years ago
- Repository for Endpoint Security Testing☆35Updated 7 years ago
- Materials for the BSides NoVA/Charleston 2018 Bro Workshop☆14Updated 5 months ago
- Web based analysis platform for use with the AWS_IR command line tool.☆17Updated 9 years ago
- GitPwnd is a network penetration tool that lets you use a git repo for command and control of compromised machines☆144Updated 2 years ago
- All Day DevOps - Automated Infrastructure Security Monitoring and Defence (ELK + AWS Lambda)☆24Updated 8 years ago
- Small Node CLI tool to extract active contributors on repos and orgs☆10Updated 2 years ago
- badbucket checks your s3 bucket for common misconfigurations☆24Updated 8 years ago
- Harbinger Threat Intelligence☆82Updated 9 years ago
- Finding Valuable Needles in Global Source Code Haystacks with Automation☆17Updated 4 years ago
- first commit☆20Updated last month
- Extract deleted secrets from git repos☆61Updated 7 years ago