coinbase / dexterLinks
Forensics acquisition framework designed to be extensible and secure
☆126Updated 6 years ago
Alternatives and similar repositories for dexter
Users that are interested in dexter are comparing it to the libraries listed below
Sorting:
- Google Cloud Platform Security Tool☆234Updated 6 years ago
- Things to know when DFIR occurs near a vault deployment.☆43Updated 7 years ago
- ☆25Updated 6 years ago
- Blockchains. Destruction. Mayhem.☆50Updated 2 years ago
- A Purposefully Vulnerable Blockchain☆51Updated 4 years ago
- Python module for evaluation of AWS account best practices around incident handling readieness.☆55Updated 5 years ago
- Provide a shell like interface by utilizing osquery's distributed API☆81Updated 5 years ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆64Updated 6 years ago
- Materials for the BSides NoVA/Charleston 2018 Bro Workshop☆14Updated 2 months ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 9 years ago
- A Terraform module for GRR: the distributed incident forensics and response framework☆51Updated 5 years ago
- Scripts for AWS amusement...☆21Updated 3 years ago
- Osquery Mangement Server☆114Updated 5 years ago
- Tools for AWS forensics☆63Updated 9 years ago
- Unblockable Chains - A POC on using blockchain as infrastructure for malware operations☆67Updated 6 years ago
- PhishDetect is a library to help identify phishing pages☆109Updated 2 years ago
- Proof of Concept Zappa Based AWS Persistence and Attack Platform☆39Updated 5 years ago
- Exfiltrate files via DNS☆95Updated 12 years ago
- Using osquery for Mass Incident Detection & Response☆19Updated 9 years ago
- GCP and GSUITE security auditing scripts☆27Updated last year
- daemon for PolySwarm, the first decentralized threat intelligence market.☆14Updated 4 years ago
- Monitor Certificate Transparency Logs For Phishing Domains☆25Updated 6 years ago
- GitPwnd is a network penetration tool that lets you use a git repo for command and control of compromised machines☆145Updated 2 years ago
- A place for documenting threats and mitigations related to containers orchestrators (Kubernetes, Swarm etc)☆25Updated 7 years ago
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 10 years ago
- AMIRA: Automated Malware Incident Response & Analysis☆151Updated 7 months ago
- CARET - A tool for viewing cyber analytic relationships☆55Updated 5 years ago
- A Blockchain And Smart Contract Based CTF☆16Updated 2 years ago
- 🔐 A concurrent, command-line AWS S3 Fuzzer. Written in Go.☆45Updated 7 years ago
- A working client implementation for AlienVault OTX API written in Golang!☆58Updated 3 years ago