aws-samples / drs-malware-scanLinks
Perform file-based malware scan on your on-prem servers with AWS
☆13Updated 2 years ago
Alternatives and similar repositories for drs-malware-scan
Users that are interested in drs-malware-scan are comparing it to the libraries listed below
Sorting:
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆16Updated last year
- Short deep dive into Threat Hunting on AWS☆15Updated 2 years ago
- ☆18Updated 8 months ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆32Updated last year
- ☆14Updated 2 weeks ago
- ☆36Updated 4 years ago
- ☆55Updated 2 years ago
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆48Updated 6 months ago
- ReconPal: Leveraging NLP for Infosec☆57Updated 3 years ago
- A tool for secrets management, encryption as a service, and privileged access management☆14Updated 5 months ago
- A simple web app to get the latest EPSS data for a CVE ID☆11Updated last week
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆58Updated 10 months ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆33Updated 3 years ago
- ☆18Updated 3 years ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated last year
- MS Graph Commands and Tools for Blue Teamers☆52Updated 2 years ago
- A public repository of MITRE ATT&ACK TTP mappings by BushidoUK for OSINT reports that lack a section breaking down the TTPs.☆28Updated 9 months ago
- This script is to build Wazuh 4.3 environment☆11Updated 3 years ago
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆37Updated last year
- CLI Search for Security Operators of MITRE ATT&CK URLs☆17Updated 2 years ago
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Updated last year
- A GitHub Actions Supply Chain CTF / Goat☆30Updated this week
- ☆31Updated 2 weeks ago
- Invictus Threat Intelligence: IOCs and TTPs from blogs, research and more☆31Updated 3 weeks ago
- A preconfigured Windows-based system designed for rapid forensic investigations in both Azure and AWS.☆39Updated last year
- CIS Benchmark testing of Windows SIEM configuration☆45Updated 2 years ago
- urlyzer is a URL parsing analysis tool.☆24Updated last year
- ☆18Updated 2 weeks ago
- Azure Activity Log Axe is a continually developing tool that simplifies the transactional log format provided by Microsoft. The tool leve…☆34Updated last year
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆23Updated 2 years ago