☆97Feb 19, 2024Updated 2 years ago
Alternatives and similar repositories for aws-incident-response-playbooks-workshop
Users that are interested in aws-incident-response-playbooks-workshop are comparing it to the libraries listed below
Sorting:
- This repository provides sample templates for security playbooks against various scenarios when using Amazon Web Services.☆649Updated this week
- Automated Amazon GuardDuty Security Response☆29Dec 23, 2024Updated last year
- ☆401Sep 25, 2023Updated 2 years ago
- This repository can be used to generate and evaluate findings detected by Amazon GuardDuty☆420Jan 7, 2026Updated 2 months ago
- ☆16Mar 27, 2024Updated last year
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆51Apr 25, 2024Updated last year
- A tool for AWS incident response, that allows for enumeration, acquisition and analysis of data from AWS environments for the purpose of …☆198Jan 6, 2026Updated 2 months ago
- Terraform module to deploy AWS Network Firewall☆18May 31, 2025Updated 9 months ago
- AWS GD2ACL☆57Jul 26, 2024Updated last year
- A Kubernetes Forensic Collection Framework for Azure Kubernetes Service☆41Feb 9, 2026Updated last month
- ☆34May 24, 2022Updated 3 years ago
- Lambda function that streamlines containment of an AWS account compromise☆344Dec 1, 2023Updated 2 years ago
- This solutions facilitates rapid deployment of Prowler, full AWS Organization analysis, and finding processing as part of a security post…☆61Jun 2, 2025Updated 9 months ago
- Generates runbooks for GuardDuty findings☆38Jun 24, 2024Updated last year
- Repository with supporting materials for Invictus Academy/Training☆44Jan 3, 2025Updated last year
- DeTT&CT Editor☆12Jan 21, 2026Updated last month
- Example solutions demonstrating how to implement patterns within the AWS Security Reference Architecture guide using CloudFormation (incl…☆1,121Dec 12, 2025Updated 2 months ago
- Automated Security Response on AWS is an add-on solution that works with AWS Security Hub to provide a ready-to-deploy architecture and a…☆465Updated this week
- Tool to spray AWS Console IAM Logins☆35Jun 15, 2022Updated 3 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Jan 8, 2024Updated 2 years ago
- In this workshop, you will learn techniques to implement your Disaster Recovery strategies based on AWS multi-region approach. Questions?…☆25May 21, 2024Updated last year
- Offline Active Directory Domain Services (AD DS) Join☆12Jan 4, 2017Updated 9 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- This is an open-source repository of cybersecurity curricular modules for K-12☆50Jul 18, 2024Updated last year
- Summaries, transcripts, key points, and other useful insights from fwd:cloudsec 2025 talks for those of us who don't have time to watch e…☆85Jul 4, 2025Updated 8 months ago
- AWS Security Analytics Bootstrap enables customers to perform security investigations on AWS service logs by providing an Amazon Athena a…☆272Mar 2, 2026Updated last week
- A cheatsheet containing AWS CloudTrail events that can be used for Incident Response purposes or Detection Engineering.☆80Jan 6, 2026Updated 2 months ago
- MISP Playbooks☆222Oct 14, 2025Updated 4 months ago
- Grepify the GUI Regex Text Scanner for Code Reviewers☆23Apr 15, 2013Updated 12 years ago
- STIX 2 Fake Data Generator☆11Oct 17, 2024Updated last year
- Generate datasets of cloud audit logs for common attacks☆234Updated this week
- ☆18Apr 20, 2022Updated 3 years ago
- CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known…☆266Nov 21, 2025Updated 3 months ago
- Creates a CloudFormation stack for running Security Monkey☆27Mar 21, 2019Updated 6 years ago
- Network sinkhole for isolated malware analysis☆40Mar 5, 2018Updated 8 years ago
- Assisted Log Enabler for AWS - Find AWS resources that are not logging, and turn them on.☆273Updated this week
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆173Mar 2, 2026Updated last week
- An AWS tool to help you create a point in time assessment of your AWS account using Prowler.☆592Nov 12, 2025Updated 3 months ago
- aws-security-architecture☆14Oct 17, 2023Updated 2 years ago