☆20Jan 8, 2021Updated 5 years ago
Alternatives and similar repositories for aws-remediation-framework
Users that are interested in aws-remediation-framework are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Coming to a place near you.....☆25Jun 29, 2015Updated 10 years ago
- A packer utility to create and capture DFIR Image for use AWS & Azure☆15Oct 18, 2019Updated 6 years ago
- Python implementation of select MicroBurst scripts.☆15Aug 19, 2021Updated 4 years ago
- ☆12May 8, 2018Updated 7 years ago
- ☆14May 27, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Transform AWS Config snapshots to a more AWS Athena-friendly format.☆11Aug 26, 2020Updated 5 years ago
- A websocket proxy☆13Nov 13, 2017Updated 8 years ago
- Proof of concept incident response demo using SSM and AWS Fargate.☆14Dec 5, 2019Updated 6 years ago
- Another Vulnerability Auditor - Community Edition☆13Jun 1, 2021Updated 4 years ago
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.☆31Jul 12, 2023Updated 2 years ago
- ☆37Apr 30, 2020Updated 5 years ago
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆31Aug 16, 2023Updated 2 years ago
- InSpec profile to validate your VPC to the standards of the CIS Amazon Web Services Foundations Benchmark☆77Dec 14, 2025Updated 4 months ago
- OSSEM Modular☆27Jun 29, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Demonstrates sending AWS SecurityHub findings to your email☆14Dec 14, 2018Updated 7 years ago
- Find and download files from multiple Github repositories☆99Oct 30, 2017Updated 8 years ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Mar 1, 2021Updated 5 years ago
- QL Workshop☆16Sep 30, 2019Updated 6 years ago
- Automated Attack Simulation in the Cloud, complete with detection use cases.☆613Nov 28, 2024Updated last year
- Simple DLP monitor for AWS S3 is a tool built on top of CloudWatch events and Lambda functions to alert you when data is transferred to S…☆18Mar 4, 2020Updated 6 years ago
- My BloodHound custom queries☆26Jan 10, 2023Updated 3 years ago
- ☆36Apr 29, 2025Updated 11 months ago
- CDK app to setup an isolated AWS network to experiment with ways of exfiltrating data☆18Nov 18, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- AWS Auth using WebIdentityFederation from Google Cloud☆15May 23, 2025Updated 10 months ago
- Tools to gather subdomains from Bug Bounty programs☆65Mar 29, 2018Updated 8 years ago
- Scan your account for the use of untrusted AMIs☆32Apr 6, 2026Updated last week
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆47Feb 17, 2021Updated 5 years ago
- An AWS config rule that uses IAM Access Advisor to find over-permissioned IAM users, groups, and roles.☆17Oct 21, 2019Updated 6 years ago
- Valhalla API Client☆72Jan 19, 2026Updated 2 months ago
- Github action for linting AWS IAM policy documents☆38Jan 20, 2023Updated 3 years ago
- The AWS KMS JCE Provider software library for Java is a vendor implementation for the Sun Java JCE (Java Cryptography Extension) provider…☆19Oct 8, 2025Updated 6 months ago
- ☆22Jul 14, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Terraform support for AWS DevOps Guru☆21Oct 18, 2023Updated 2 years ago
- A curated collection of tools and resources for building security with a developer first approach.☆30Jul 29, 2022Updated 3 years ago
- ☆15Oct 18, 2017Updated 8 years ago
- Example of Kerberoasting Honeypot☆18Sep 11, 2025Updated 7 months ago
- Microsoft Azure Exploitation Framework☆59Jun 30, 2021Updated 4 years ago
- Study notes on Windows NTLM Reflection and token stealing based EOPs.☆20May 5, 2021Updated 4 years ago
- Incident Response and Forensic on AWS☆20May 19, 2020Updated 5 years ago