coinbase / dexterLinks
Forensics acquisition framework designed to be extensible and secure
☆125Updated 5 years ago
Alternatives and similar repositories for dexter
Users that are interested in dexter are comparing it to the libraries listed below
Sorting:
- Google Cloud Platform Security Tool☆234Updated 5 years ago
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 10 years ago
- Python module for evaluation of AWS account best practices around incident handling readieness.☆55Updated 4 years ago
- Monitor Certificate Transparency Logs For Phishing Domains☆25Updated 6 years ago
- daemon for PolySwarm, the first decentralized threat intelligence market.☆14Updated 4 years ago
- A Terraform module for GRR: the distributed incident forensics and response framework☆51Updated 5 years ago
- Osquery Mangement Server☆114Updated 4 years ago
- Things to know when DFIR occurs near a vault deployment.☆43Updated 7 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 8 years ago
- Content for 'JIRA Risk Project' book published at LeanPub☆57Updated 7 years ago
- Blockchains. Destruction. Mayhem.☆50Updated 2 years ago
- Tools for AWS forensics☆63Updated 9 years ago
- Proof of Concept Zappa Based AWS Persistence and Attack Platform☆39Updated 4 years ago
- Unblockable Chains - A POC on using blockchain as infrastructure for malware operations☆67Updated 6 years ago
- Varna: Quick & Cheap AWS CloudTrail Monitoring with Event Query Language (EQL)☆52Updated 2 years ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆64Updated 6 years ago
- Vendor Security Model Contract☆98Updated 2 years ago
- scan s3 buckets for security issues☆85Updated 9 months ago
- Reapsaw is a continuous security devsecops tool, which helps in enabling security into CI/CD Pipeline. It supports coverage for multiple …☆41Updated 4 years ago
- OWASP Findings Format☆14Updated 4 years ago
- AMIRA: Automated Malware Incident Response & Analysis☆151Updated 4 months ago
- A Purposefully Vulnerable Blockchain☆51Updated 4 years ago
- An extensible honeypot framework☆93Updated 2 years ago
- Dig through Git commits and logs☆21Updated 6 years ago
- A finder of domain typos showing country of IP address☆166Updated last year
- Legal, procedural and policies document templates for operating an IRT☆64Updated last year
- A place for documenting threats and mitigations related to containers orchestrators (Kubernetes, Swarm etc)☆25Updated 6 years ago
- k8s audit repo☆228Updated 5 years ago
- Scan for and exploit Consul agents☆40Updated 5 years ago
- Mapping the NYC Infosec Community☆55Updated last month