Automation โ๏ธAWS Security ๐ฎ- Incident Response using Lambdaโก๏ธto prevent credential exfiltration
โ17Apr 9, 2021Updated 5 years ago
Alternatives and similar repositories for security-incident-response-instance-isolation
Users that are interested in security-incident-response-instance-isolation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Monitor Unused IAM Roles ๐โ13Apr 30, 2021Updated 5 years ago
- Repo of quick starts for real time AWS use cases ๐โ73May 30, 2023Updated 2 years ago
- โ16Feb 14, 2022Updated 4 years ago
- Security diagnostic quick start guide. Identifying the best measures and establishing specific security procedures for your organization.โ11May 29, 2019Updated 6 years ago
- โ11Nov 13, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer โข AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Code samples for SQL Server Discovery using the Microsoft Assessment and Planning (MAP) toolkitโ11Dec 9, 2020Updated 5 years ago
- Python 3.6+ module to make Flask compatible with AWS Lambdaโ10Jul 5, 2023Updated 2 years ago
- An SMTP server sidecar to allow AWS SES usage with IAM rolesโ15Apr 7, 2026Updated 3 weeks ago
- โ19Apr 5, 2026Updated last month
- Code samples for Query relational data in Azureโ17Jun 10, 2020Updated 5 years ago
- GitHub action to run Threagile, the agile threat modeling toolkit, on a repo's threagile.yaml fileโ14May 3, 2024Updated 2 years ago
- Resources, Tips, Tricks , Resources, Notes and much moreโ21Jan 12, 2023Updated 3 years ago
- Code samples for the Learn module: Remotely monitor and control devices with IoT Hub. The scenario in this example is monitoring a wine cโฆโ14Dec 12, 2019Updated 6 years ago
- CRDTโ20Sep 30, 2020Updated 5 years ago
- Open source password manager - Proton Pass โข AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- This is the GitHub repository for the technical product documentation for Machine Learning Server. See the README.md file for more. Thisโฆโ18Nov 22, 2024Updated last year
- Mastering Azure Security, published by Packtโ15Oct 28, 2022Updated 3 years ago
- A reimplementation of the EtherApe style display for OS X. Note that this is not a fork of EtherApe. Written in a kinder, gentler, age โฆโ21Dec 3, 2018Updated 7 years ago
- a azure monitor workbook for LogicAppsโ18Apr 10, 2020Updated 6 years ago
- Additional Resources to improve Customer Experience with Azure Advanced Threat Protectionโ22Jun 12, 2023Updated 2 years ago
- A python script to automatically scan and tag AWS Resources ๐โ10Apr 17, 2018Updated 8 years ago
- CloudCustodian Rules engine for cloud security and governance, DSL in yaml for policies to query, filter, and take actions on resourcesโ22Aug 25, 2023Updated 2 years ago
- This Guidance demonstrates how to automate the deployment of centralized network security infrastructure that inspects and filters traffiโฆโ46Feb 11, 2026Updated 2 months ago
- A few quick recipes for those that do not have much time during the dayโ22Oct 28, 2024Updated last year
- End-to-end encrypted cloud storage - Proton Drive โข AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- โ18Feb 21, 2020Updated 6 years ago
- A collection of Ansible automation roles for my homelab.โ13Jan 17, 2025Updated last year
- An IaaS Implementation of ELK Stack ๐โ17Apr 7, 2021Updated 5 years ago
- Lambdas which does ECR scan and sends results to slackโ20Jul 22, 2020Updated 5 years ago
- PowerShell commands to export the Azure Sentinel Rule Templates to a CSV and to create the Rules from selected entries in the CSV fileโ17Oct 31, 2024Updated last year
- Daily updated malware indicator lists from TR-CERT (USOM), including parsed malicious URLs, IPs, and domains.โ15Updated this week
- Like the unix tree command but for GCP Org Heirarchyโ27Apr 29, 2021Updated 5 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap fileโ25Aug 1, 2022Updated 3 years ago
- Samples for specific topics across Windows dev doc repos.โ28Oct 31, 2025Updated 6 months ago
- Managed hosting for WordPress and PHP on Cloudways โข AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- โ20May 30, 2025Updated 11 months ago
- Some simple scripts for decrypting passwords retrieved from a Manage Engine OpManager installationโ11Jan 28, 2016Updated 10 years ago
- Baseline Security Configuration For MacOSโ67Aug 28, 2018Updated 7 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.โ24Jan 8, 2024Updated 2 years ago
- Deploy your DNS configuration using GitHub Actions using DNSControl.โ12Apr 15, 2026Updated 3 weeks ago
- โ12Aug 5, 2024Updated last year
- Threat intelligence or Cyber Threat Intelligence is the process of identifying and analyzing gathered information about past, current, anโฆโ13Feb 18, 2024Updated 2 years ago