Updated incident response generator for training classes
☆43Jun 2, 2021Updated 4 years ago
Alternatives and similar repositories for IncidentResponseGenerator
Users that are interested in IncidentResponseGenerator are comparing it to the libraries listed below
Sorting:
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- An easy way to give all your EC2 instances SSH host certificates☆16Feb 25, 2023Updated 3 years ago
- This command line tool counts the number of resources in different categories across Amazon regions.☆59Dec 17, 2019Updated 6 years ago
- AWS S3 Sensitive Data Search☆35Jan 16, 2022Updated 4 years ago
- ☆20Jan 12, 2022Updated 4 years ago
- AWS Inventory and Compliance Framework☆224Jul 12, 2023Updated 2 years ago
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- Varna: Quick & Cheap AWS CloudTrail Monitoring with Event Query Language (EQL)☆52Dec 26, 2022Updated 3 years ago
- Mutable Universal Relay Document Kit☆17Oct 31, 2014Updated 11 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆14Feb 1, 2022Updated 4 years ago
- Proof of concept incident response demo using SSM and AWS Fargate.☆14Dec 5, 2019Updated 6 years ago
- Catalog Red Team techniques that cause popups in various macOS versions☆15Nov 18, 2024Updated last year
- Blazing CloudTrail since 2018☆138Jan 27, 2019Updated 7 years ago
- Cloud security tutorials and best practices☆38Mar 20, 2023Updated 2 years ago
- This service provides authenticated access to a static website hosted in an s3 bucket.☆33Feb 25, 2023Updated 3 years ago
- A Java library for programmatically calculating OWASP Risk Rating scores☆19Apr 3, 2023Updated 2 years ago
- Simple CLI utility to save off an image from every webcam hooked into a mac☆14May 20, 2021Updated 4 years ago
- A Security Scanner for Go☆26Feb 11, 2019Updated 7 years ago
- A virtual MediaWiki development environment, built on Vagrant, VirtualBox, and Puppet.☆16Dec 1, 2016Updated 9 years ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Nov 8, 2021Updated 4 years ago
- SkyWrapper helps to discover suspicious creation forms and uses of temporary tokens in AWS☆108Mar 25, 2021Updated 4 years ago
- Proof of Concept Zappa Based AWS Persistence and Attack Platform☆40Jun 26, 2020Updated 5 years ago
- CDK app to setup an isolated AWS network to experiment with ways of exfiltrating data☆18Nov 18, 2021Updated 4 years ago
- A Lambda-powered Security Orchestration framework for AWS GuardDuty☆53Dec 15, 2019Updated 6 years ago
- Repository to archive AWS Documentation for local use☆50Oct 14, 2024Updated last year
- Protecting Red Team infrastructure with cyber shield blocking AWS/AZURE/IBM/Digital Ocean/TOR/AV IP/ETC. ranges☆45Jul 31, 2022Updated 3 years ago
- ☆139Mar 29, 2023Updated 2 years ago
- Framework for API Maturity Assessment☆20Jan 17, 2020Updated 6 years ago
- ☆25Dec 10, 2018Updated 7 years ago
- Easy to extend initial access scenario to help with EDR testing on Linux and Mac☆26Mar 20, 2022Updated 3 years ago
- Dow Jones Hammer : Protect the cloud with the power of the cloud(AWS)☆448Jul 17, 2023Updated 2 years ago
- Scripts to quickly fix security and compliance issues☆28Feb 9, 2026Updated 3 weeks ago
- Cobalt Strike log state tracking, parsing, and storage☆24Jul 18, 2019Updated 6 years ago
- Provides an alternative, or maybe a more user friendly way to use the native boto3 API.☆28Apr 14, 2023Updated 2 years ago
- ☆26Mar 3, 2022Updated 3 years ago
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.☆31Jul 12, 2023Updated 2 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Jan 17, 2022Updated 4 years ago
- ☆11Feb 9, 2023Updated 3 years ago
- Scripts to quickly fix security and compliance issues☆106Nov 22, 2023Updated 2 years ago