ThreatResponse / mad-kingLinks
Proof of Concept Zappa Based AWS Persistence and Attack Platform
☆39Updated 5 years ago
Alternatives and similar repositories for mad-king
Users that are interested in mad-king are comparing it to the libraries listed below
Sorting:
- Python module for evaluation of AWS account best practices around incident handling readieness.☆55Updated 5 years ago
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆22Updated 7 years ago
- Tools for AWS forensics☆63Updated 9 years ago
- Google Cloud Platform Security Tool☆234Updated 6 years ago
- Exfiltrate files via DNS☆95Updated 12 years ago
- Basic Anomaly IDS capabilities with Python and Bro☆105Updated 7 years ago
- badbucket checks your s3 bucket for common misconfigurations☆24Updated 8 years ago
- Terraform stack to deploy ELK Threat Hunting on Amazon AWS.☆89Updated 6 years ago
- This script is used to generate some basic detections of the aws security services☆71Updated 3 years ago
- Continuous Integration and Development ExploiteR☆87Updated 2 years ago
- Things to know when DFIR occurs near a vault deployment.☆43Updated 7 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Updated 8 years ago
- All Day DevOps - Automated Infrastructure Security Monitoring and Defence (ELK + AWS Lambda)☆24Updated 8 years ago
- ☆25Updated 6 years ago
- Small Node CLI tool to extract active contributors on repos and orgs☆10Updated 2 years ago
- AMIRA: Automated Malware Incident Response & Analysis☆151Updated 3 weeks ago
- Content for 'JIRA Risk Project' book published at LeanPub☆57Updated 7 years ago
- Harbinger Threat Intelligence☆82Updated 9 years ago
- A very vulnerable serverless application in AWS Lambda☆96Updated 6 years ago
- Python scripts to download, parse, and enrich scans.io study data and load into Splunk for research, threat intelligence gathering, and s…☆19Updated 3 months ago
- A Slack bot to add security info to messages containing URLs, hashes and IPs☆71Updated last year
- A place for documenting threats and mitigations related to containers orchestrators (Kubernetes, Swarm etc)☆25Updated 7 years ago
- for AWS Security material☆250Updated 3 years ago
- 'Continuous' AWS perimeter monitoring: Periodically scan internet facing AWS resources to detect misconfigured services.☆64Updated 6 years ago
- Remote Memory Acquisition Tool☆251Updated 5 years ago
- This command line tool counts the number of resources in different categories across Amazon regions.☆59Updated 5 years ago
- ☆67Updated 8 years ago
- ☆83Updated 5 years ago
- AWS Metadata Proxy for protection against SSRF☆68Updated 5 years ago
- Example detection of compromise credentials in AWS☆122Updated 7 years ago