☆97Feb 19, 2024Updated 2 years ago
Alternatives and similar repositories for aws-incident-response-playbooks-workshop
Users that are interested in aws-incident-response-playbooks-workshop are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository provides sample templates for security playbooks against various scenarios when using Amazon Web Services.☆652Updated this week
- ☆400Sep 25, 2023Updated 2 years ago
- AWS GD2ACL☆57Jul 26, 2024Updated last year
- ☆16Mar 27, 2024Updated 2 years ago
- This repository can be used to generate and evaluate findings detected by Amazon GuardDuty☆420Jan 7, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A Kubernetes Forensic Collection Framework for Azure Kubernetes Service☆41Feb 9, 2026Updated last month
- In this workshop, you will learn techniques to implement your Disaster Recovery strategies based on AWS multi-region approach. Questions?…☆25May 21, 2024Updated last year
- Share Information about Microsoft Security Products☆54Updated this week
- ☆34May 24, 2022Updated 3 years ago
- LinkedIn reconnaissance tool☆11Dec 29, 2019Updated 6 years ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆51Apr 25, 2024Updated last year
- A tool for AWS incident response, that allows for enumeration, acquisition and analysis of data from AWS environments for the purpose of …☆198Jan 6, 2026Updated 2 months ago
- Generates runbooks for GuardDuty findings☆38Jun 24, 2024Updated last year
- Example solutions demonstrating how to implement patterns within the AWS Security Reference Architecture guide using CloudFormation (incl…☆1,127Mar 10, 2026Updated 2 weeks ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Solution to customize the block period for an AWS WAF rate-based rule to prevent malicious actors from reusing the same set of IP address…☆20Jun 26, 2025Updated 9 months ago
- Bring Your Own Mitre Att&ck © Matrix !☆13Oct 19, 2023Updated 2 years ago
- This solutions facilitates rapid deployment of Prowler, full AWS Organization analysis, and finding processing as part of a security post…☆62Jun 2, 2025Updated 9 months ago
- Terraform module to deploy AWS Network Firewall☆18May 31, 2025Updated 9 months ago
- Summaries, transcripts, key points, and other useful insights from AWS re:inforce 2025 talks for those of us who don't have time to watch…☆103Jun 25, 2025Updated 9 months ago
- Summaries, transcripts, key points, and other useful insights from fwd:cloudsec 2025 talks for those of us who don't have time to watch e…☆85Jul 4, 2025Updated 8 months ago
- Repository with supporting materials for Invictus Academy/Training☆43Jan 3, 2025Updated last year
- CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known…☆266Nov 21, 2025Updated 4 months ago
- AWS Cloudformation Templates for quickly deploying BIG-IP services in AWS☆16Jul 18, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A cheatsheet containing AWS CloudTrail events that can be used for Incident Response purposes or Detection Engineering.☆81Jan 6, 2026Updated 2 months ago
- ☆22Oct 18, 2023Updated 2 years ago
- An AWS tool to help you create a point in time assessment of your AWS account using Prowler.☆597Mar 10, 2026Updated 2 weeks ago
- Bare minimum AWS Security Alerting and Secure by default Configuration☆514May 15, 2025Updated 10 months ago
- Assisted Log Enabler for AWS - Find AWS resources that are not logging, and turn them on.☆273Updated this week
- AWS Security Analytics Bootstrap enables customers to perform security investigations on AWS service logs by providing an Amazon Athena a…☆272Mar 22, 2026Updated last week
- Code examples for the AWS Security Blog post: How to use CI/CD to deploy and configure AWS security services with Terraform☆96Jul 7, 2021Updated 4 years ago
- Example AWS Resource control policies to get started or mature your usage of AWS RCPs.☆201Mar 17, 2026Updated last week
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆74Jun 21, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Holds the public Hacking the Cloud CTFs.☆63Feb 28, 2024Updated 2 years ago
- In this workshop we will build a pipeline for a sample WordPress site in a stack. We will explore how to validate, lint and test template…☆18May 20, 2024Updated last year
- A repository containing the research output from my GCFE Gold Paper which compared Windows 10 and Windows 11.☆27Jul 27, 2022Updated 3 years ago
- Using Terraform to enable Amazon GuardDuty for accounts in AWS Organizations.☆67Nov 7, 2024Updated last year
- aws-security-architecture☆14Oct 17, 2023Updated 2 years ago
- An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share th…☆12Feb 16, 2021Updated 5 years ago
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆174Mar 2, 2026Updated 3 weeks ago