andrewkrug / fargate-irView external linksLinks
Proof of concept incident response demo using SSM and AWS Fargate.
☆14Dec 5, 2019Updated 6 years ago
Alternatives and similar repositories for fargate-ir
Users that are interested in fargate-ir are comparing it to the libraries listed below
Sorting:
- CDK app to setup an isolated AWS network to experiment with ways of exfiltrating data☆18Nov 18, 2021Updated 4 years ago
- A CLI that utilizes Okta IdP via SAML to acquire temporary AWS credentials☆10Jun 30, 2021Updated 4 years ago
- The original AWS security enforcer™☆61Mar 6, 2019Updated 6 years ago
- Workflows for Shuffle☆24Oct 26, 2022Updated 3 years ago
- Sample code for integrating AWS CloudFormation templates security tests (using CFN-Nag and CFN-Guard) with both AWS Security Hub and AWS …☆24Mar 23, 2024Updated last year
- Workshop on how to implement automated remediations of findings submitted to AWS Security Hub leveraging an open source tool named Cloud …☆22Jun 8, 2021Updated 4 years ago
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.☆31Jul 12, 2023Updated 2 years ago
- Old home of LimaCharlie, open source EDR☆32Sep 4, 2023Updated 2 years ago
- Updated incident response generator for training classes☆43Jun 2, 2021Updated 4 years ago
- ☆374Feb 23, 2024Updated last year
- 2018 Computational Text Analysis Notebooks, University of Mannheim☆13Nov 22, 2018Updated 7 years ago
- Community content for LogRhythm Axon. Includes Dashboards, searches, analytics rules, processing policies and more.☆10Jul 26, 2024Updated last year
- A CLI tool for building simple to complex IAM policies☆69Dec 5, 2023Updated 2 years ago
- Defence Against the Dark Arts☆34Sep 15, 2019Updated 6 years ago
- Simulates a compromise in a cloud and container environment☆33Dec 18, 2024Updated last year
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆39Dec 17, 2025Updated 2 months ago
- Office365 Log Analysis Framework☆81Jun 6, 2019Updated 6 years ago
- ☆83Dec 5, 2019Updated 6 years ago
- ☆12May 8, 2018Updated 7 years ago
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- GCP CSPM using Google Sheets☆38Apr 4, 2025Updated 10 months ago
- Hands-on workshop on how to build security automation in pipelines☆37Apr 22, 2024Updated last year
- ☆157Jul 8, 2023Updated 2 years ago
- Python installable command line utiltity for mitigation of host and key compromises.☆347Jul 23, 2021Updated 4 years ago
- Event Query Router☆12Aug 9, 2019Updated 6 years ago
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- Most Popular Attack and Defend Competitive A/D mode for 5 years!☆12Feb 5, 2018Updated 8 years ago
- Threat Network Detection in Online Social Networks☆10Jan 20, 2017Updated 9 years ago
- Ellation Formation Tools for AWS☆12Oct 13, 2025Updated 4 months ago
- Remote Memory Acquisition Tool☆253Sep 22, 2020Updated 5 years ago
- PST Parser using pypff - Export all email headers and body to csv or json☆10Nov 8, 2019Updated 6 years ago
- Fluxion is a easy to use wifi cracker, to test your own network☆11Feb 8, 2017Updated 9 years ago
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- Proof of Concept Zappa Based AWS Persistence and Attack Platform☆40Jun 26, 2020Updated 5 years ago
- Automate ISSG Tool Setups☆13Nov 21, 2024Updated last year
- Project that creates a Kubernetes environment in Azure (AKS) and protects it with CloudGuard CSPM / Workload and Appsec technologies☆10Jun 12, 2023Updated 2 years ago
- ☆50Jan 30, 2026Updated 2 weeks ago
- Bash scripts for use on Linux for minting Cardano NFTs☆12Aug 2, 2022Updated 3 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year