google / docker-explorerLinks
A tool to help forensicate offline docker acquisitions
☆549Updated last year
Alternatives and similar repositories for docker-explorer
Users that are interested in docker-explorer are comparing it to the libraries listed below
Sorting:
- (DEPRECATED) Diffy is a triage tool used during cloud-centric security incidents, to help digital forensics and incident response (DFIR)…☆632Updated last year
- Remote Memory Acquisition Tool☆251Updated 5 years ago
- Python library to carry out DFIR analysis on the Cloud☆487Updated 2 months ago
- A production-friendly malware scanner for your AWS cloud☆199Updated 4 years ago
- Python installable command line utiltity for mitigation of host and key compromises.☆348Updated 4 years ago
- Automation and Scaling of Digital Forensics Tools☆771Updated 3 weeks ago
- A repository for using osquery for incident detection and response☆863Updated 3 weeks ago
- an osquery fleet manager☆618Updated 2 years ago
- A Terraform module for GRR: the distributed incident forensics and response framework☆51Updated 5 years ago
- Real-time, container-based file scanning at enterprise scale☆950Updated 3 weeks ago
- A Linux Auditd rule set mapped to MITRE's Attack Framework☆811Updated 5 years ago
- A honey token manager and alert system for AWS.☆320Updated 3 years ago
- The clever vulnerability dependency finder☆96Updated 3 years ago
- ChaoSlingr: Introducing Security into Chaos Testing☆68Updated 6 years ago
- Google Cloud Platform Security Tool☆234Updated 6 years ago
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆256Updated 10 months ago
- Chain Reactor is an open source framework for composing executables that simulate adversary behaviors and techniques on Linux endpoints.☆319Updated 5 months ago
- A UNIX security auditing tool based on several security frameworks☆317Updated last week
- osquery extensions by Trail of Bits☆264Updated 2 years ago
- Dow Jones Hammer : Protect the cloud with the power of the cloud(AWS)☆443Updated 2 years ago
- ☆375Updated last year
- Open Cloud Security Posture Management Engine☆342Updated 3 years ago
- Osquery Resources☆62Updated 6 years ago
- Awesome list of resources related to container security☆244Updated 10 months ago
- A framework for orchestrating forensic collection, processing and data export☆329Updated 3 weeks ago
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆541Updated 5 months ago
- k8s audit repo☆229Updated 6 years ago
- A container analysis and exploitation tool for pentesters and engineers.☆673Updated 2 years ago
- Script for automating Linux memory capture and analysis☆272Updated 5 years ago
- CIS Docker Benchmark - InSpec Profile☆518Updated 2 years ago