coinbase / dexterLinks
Forensics acquisition framework designed to be extensible and secure
☆124Updated 6 years ago
Alternatives and similar repositories for dexter
Users that are interested in dexter are comparing it to the libraries listed below
Sorting:
- Things to know when DFIR occurs near a vault deployment.☆44Updated 7 years ago
- Google Cloud Platform Security Tool☆235Updated 6 years ago
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 10 years ago
- Tools for AWS forensics☆65Updated 9 years ago
- Python module for evaluation of AWS account best practices around incident handling readieness.☆55Updated 5 years ago
- Blockchains. Destruction. Mayhem.☆50Updated 3 years ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆65Updated 6 years ago
- Provide a shell like interface by utilizing osquery's distributed API☆82Updated 5 years ago
- Proof of Concept Zappa Based AWS Persistence and Attack Platform☆40Updated 5 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 9 years ago
- GitPwnd is a network penetration tool that lets you use a git repo for command and control of compromised machines☆145Updated 2 years ago
- A Purposefully Vulnerable Blockchain☆52Updated 4 years ago
- A Terraform module for GRR: the distributed incident forensics and response framework☆52Updated 5 years ago
- A Chef Cookbook to install and configure osquery.☆14Updated 3 years ago
- ☆25Updated 7 years ago
- Materials for the BSides NoVA/Charleston 2018 Bro Workshop☆14Updated 7 months ago
- A finder of domain typos showing country of IP address☆166Updated 2 years ago
- GoLang Scripting Expert, a repo for template scripts regarding basic golang functions, many with a security focus☆23Updated 5 years ago
- A place for documenting threats and mitigations related to containers orchestrators (Kubernetes, Swarm etc)☆25Updated 7 years ago
- The clever vulnerability dependency finder☆96Updated 3 years ago
- AWS Metadata Proxy for protection against SSRF☆68Updated 5 years ago
- Osquery Mangement Server☆115Updated 5 years ago
- Finding Ethereum nodes which are vulnerable to RPC-attacks☆31Updated 9 years ago
- Content for 'JIRA Risk Project' book published at LeanPub☆57Updated 7 years ago
- Monitor Certificate Transparency Logs For Phishing Domains☆24Updated 7 years ago
- Auditing & Hardening script for Kubernetes☆45Updated 7 years ago
- 🔐 A concurrent, command-line AWS S3 Fuzzer. Written in Go.☆45Updated 8 years ago
- A Blockchain And Smart Contract Based CTF☆17Updated 2 years ago
- Welcome to OpenDevSecOps! Our mission is to deliver highly-resilient, readily-available and free defensive and offensive devops security …☆21Updated 6 years ago
- Exfiltrate files via DNS☆95Updated 12 years ago