clr2of8 / DeployREMnux
DeployREMnux is a Python script that will deploy a cloud instance of the public REMnux distribution in the Amazon cloud (AWS).
☆16Updated 5 years ago
Alternatives and similar repositories for DeployREMnux:
Users that are interested in DeployREMnux are comparing it to the libraries listed below
- Site for IWS book content☆18Updated 6 years ago
- Indices for courses in SANS' Network Security Operations curriculum☆15Updated 9 years ago
- Collection of scripts and tools that I created to aid in my testing.☆14Updated 3 years ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 6 years ago
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 4 years ago
- Mass Triage Tools☆20Updated last month
- Force-Directed Graph Generator for Volatility Ouputs☆26Updated 6 years ago
- Git for me to put all my forensics stuff☆21Updated 2 months ago
- Presentation materials for talks I've given.☆20Updated 5 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆28Updated 8 years ago
- Crack your macros like the math pros.☆33Updated 8 years ago
- ☆12Updated 3 years ago
- Plugins to add funtionality to ProcDOT. http://www.procdot.com☆23Updated last year
- A set of tools for collecting forensic information☆26Updated 4 years ago
- ☆22Updated 4 years ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Updated 3 years ago
- C# User Simulation☆32Updated 2 years ago
- OSSEM Modular☆27Updated 4 years ago
- Use DNS to hunt for threats including DGAs☆15Updated 9 years ago
- PowerShell Memory Pulling script☆19Updated 10 years ago
- Parses Java Cache IDX files☆39Updated 7 years ago
- ☆14Updated 6 years ago
- Set of utilities for getting information about Windows Events☆15Updated 6 years ago
- YARA Rule Strings Statistics Calculator and Malware Research Helper☆13Updated 3 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Updated 5 years ago
- Code and Slides of my BSides London 2019 presentation about Attacker Emulation using CALDERA☆22Updated 5 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Updated 6 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- Rekall Forensics and Incident Response Framework with rVMI extensions☆33Updated 4 years ago
- Working through Practical Malware Analysis from No Starch Press☆13Updated 7 years ago