coinbase / dexterLinks
Forensics acquisition framework designed to be extensible and secure
☆126Updated 6 years ago
Alternatives and similar repositories for dexter
Users that are interested in dexter are comparing it to the libraries listed below
Sorting:
- Google Cloud Platform Security Tool☆234Updated 6 years ago
- Things to know when DFIR occurs near a vault deployment.☆43Updated 7 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 9 years ago
- Blockchains. Destruction. Mayhem.☆50Updated 2 years ago
- Mapping the NYC Infosec Community☆55Updated last week
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆64Updated 6 years ago
- A finder of domain typos showing country of IP address☆167Updated last year
- GoLang Scripting Expert, a repo for template scripts regarding basic golang functions, many with a security focus☆22Updated 5 years ago
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 10 years ago
- Python module for evaluation of AWS account best practices around incident handling readieness.☆55Updated 5 years ago
- Provide a shell like interface by utilizing osquery's distributed API☆81Updated 5 years ago
- A Terraform module for GRR: the distributed incident forensics and response framework☆51Updated 5 years ago
- A Chef Cookbook to install and configure osquery.☆14Updated 2 years ago
- A Purposefully Vulnerable Blockchain☆52Updated 4 years ago
- Osquery Mangement Server☆114Updated 5 years ago
- Ruby bindings for the yara file analysis and classification library☆27Updated 14 years ago
- Dig through Git commits and logs☆21Updated 6 years ago
- Tools for AWS forensics☆63Updated 9 years ago
- Materials for the BSides NoVA/Charleston 2018 Bro Workshop☆14Updated 4 months ago
- Proof of Concept Zappa Based AWS Persistence and Attack Platform☆39Updated 5 years ago
- Vendor Security Model Contract☆98Updated 3 years ago
- GitPwnd is a network penetration tool that lets you use a git repo for command and control of compromised machines☆144Updated 2 years ago
- Content for 'JIRA Risk Project' book published at LeanPub☆57Updated 7 years ago
- Unblockable Chains - A POC on using blockchain as infrastructure for malware operations☆67Updated 6 years ago
- Monitor Certificate Transparency Logs For Phishing Domains☆25Updated 6 years ago
- PhishDetect is a library to help identify phishing pages☆109Updated 2 years ago
- Web based analysis platform for use with the AWS_IR command line tool.☆17Updated 9 years ago
- Certificate Transparency Log aggregation, parsing, and streaming service☆104Updated 7 years ago
- 🔐 A concurrent, command-line AWS S3 Fuzzer. Written in Go.☆45Updated 7 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago