coinbase / dexter
Forensics acquisition framework designed to be extensible and secure
☆125Updated 5 years ago
Alternatives and similar repositories for dexter
Users that are interested in dexter are comparing it to the libraries listed below
Sorting:
- Google Cloud Platform Security Tool☆234Updated 5 years ago
- Osquery Mangement Server☆114Updated 4 years ago
- Python module for evaluation of AWS account best practices around incident handling readieness.☆55Updated 4 years ago
- Dashboard to collect, analyze, and respond to reported phishing emails.☆290Updated last year
- Things to know when DFIR occurs near a vault deployment.☆43Updated 6 years ago
- A place for documenting threats and mitigations related to containers orchestrators (Kubernetes, Swarm etc)☆25Updated 6 years ago
- A Terraform module for GRR: the distributed incident forensics and response framework☆51Updated 5 years ago
- Monitor Certificate Transparency Logs For Phishing Domains☆25Updated 6 years ago
- scan s3 buckets for security issues☆85Updated 9 months ago
- daemon for PolySwarm, the first decentralized threat intelligence market.☆14Updated 4 years ago
- Vendor Security Model Contract☆98Updated 2 years ago
- Varna: Quick & Cheap AWS CloudTrail Monitoring with Event Query Language (EQL)☆52Updated 2 years ago
- A Chef Cookbook to install and configure osquery.☆14Updated 2 years ago
- Schillings SwordPhish empowers organisations and engages its employees to establish the key component of any cyber security strategy: th…☆109Updated 7 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 8 years ago
- Provide a shell like interface by utilizing osquery's distributed API☆81Updated 4 years ago
- Mapping the NYC Infosec Community☆53Updated 3 weeks ago
- Certificate Transparency Log aggregation, parsing, and streaming service☆102Updated 7 years ago
- A finder of domain typos showing country of IP address☆166Updated last year
- Remote Memory Acquisition Tool☆245Updated 4 years ago
- This repo contains all of my OS hardening scripts☆68Updated 7 years ago
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 9 years ago
- ☆78Updated 9 years ago
- INACTIVE - Collection of Tools & Procedures for double checking GitHub configurations☆138Updated last year
- Main Build directory☆179Updated 6 years ago
- Scan for and exploit Consul agents☆40Updated 5 years ago
- The original AWS security enforcer™☆61Updated 6 years ago
- Content for 'JIRA Risk Project' book published at LeanPub☆57Updated 7 years ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆64Updated 6 years ago
- AWS Metadata Proxy for protection against SSRF☆68Updated 5 years ago