cado-security / AWS_EKS_Cluster_Forensics
AWS EKS Cluster Forensics
☆23Updated 3 years ago
Alternatives and similar repositories for AWS_EKS_Cluster_Forensics:
Users that are interested in AWS_EKS_Cluster_Forensics are comparing it to the libraries listed below
- ☆18Updated 3 years ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 3 years ago
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.☆27Updated last year
- Simulates a compromise in a cloud and container environment☆32Updated last month
- A happy place for detection engineers, purple teamers and threat hunters focusing on macOS.☆21Updated 2 years ago
- Knowledge Report Alert & Normalization Generator☆27Updated 10 months ago
- ☆65Updated 8 months ago
- Attack Range to test detection against nativel serverless cloud services and environments☆35Updated 3 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆13Updated 3 years ago
- Workflows for Shuffle☆21Updated 2 years ago
- Fun tools around the EBS Direct API☆18Updated 3 years ago
- pocket guide for core detection engineering concepts☆27Updated last year
- DNS Dashboard for hunting and identifying beaconing☆14Updated 4 years ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆30Updated 4 months ago
- Recon Hunt Queries☆76Updated 3 years ago
- ☆40Updated last month
- Security Alert Decoration☆26Updated 2 weeks ago
- pollen - A command-line tool for interacting with TheHive☆35Updated 5 years ago
- A POC to implement Detection-as-Code with Terraform and Sumo Logic.☆25Updated last year
- Updated incident response generator for training classes☆43Updated 3 years ago
- Remotely collect linux live forensics artifacts.☆13Updated 2 years ago
- Web based analysis platform for use with the AWS_IR command line tool.☆17Updated 8 years ago
- ☆34Updated last year
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 3 years ago
- pocket guide for core threat hunting concepts☆23Updated 4 years ago
- Repository that contains a set of purposefully erroneous Yara rules.☆48Updated last year
- The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activ…☆14Updated last week
- Simple Docker Honeypot server emulating small snippets of the Docker HTTP API☆30Updated 4 years ago
- Track progress and keep notes while working through likethecoins' CTI Self Study Plan☆28Updated 2 years ago
- Threat Box Assessment Tool☆19Updated 3 years ago