Incident Response and Forensic on AWS
☆20May 19, 2020Updated 5 years ago
Alternatives and similar repositories for incident-response-and-forensic
Users that are interested in incident-response-and-forensic are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Python, Boto3 script that leverages a forensic volume to attach & mount to a selected instance, run a memory dump, unmount and detach f…☆12Jul 15, 2020Updated 5 years ago
- A python module for orchestrating content acquisitions and analysis via amazon ssm.☆58Nov 2, 2023Updated 2 years ago
- ☆27Aug 11, 2020Updated 5 years ago
- Three datasets to practice Threat Hunting against.☆46Jan 3, 2024Updated 2 years ago
- ☆375Feb 23, 2024Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Queries for parsed spotlight database in sqlite☆13Dec 29, 2020Updated 5 years ago
- Scripts from my book OS X Incident Response Scripting and Analysis -> https://www.amazon.com/dp/012804456X/ref=cm_sw_r_tw_dp_U_x_fQeLAb68…☆50Sep 23, 2016Updated 9 years ago
- An in-development fork of the Riverloopsec Killerbee Project with additional tools / bugfixes☆11Jan 16, 2018Updated 8 years ago
- Transform AWS Config snapshots to a more AWS Athena-friendly format.☆11Aug 26, 2020Updated 5 years ago
- Lab and supplemental content for AWS re:Inforce 2019 session SEP315☆13Feb 28, 2022Updated 4 years ago
- AWS Quick Start Team☆17Oct 3, 2024Updated last year
- Based on Lightspin proprietary data, research, and our tracking of cloud security trends in the market, our research team has compiled a …☆40Aug 8, 2022Updated 3 years ago
- ☆16Oct 29, 2023Updated 2 years ago
- Proof of concept incident response demo using SSM and AWS Fargate.☆14Dec 5, 2019Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Web based analysis platform for use with the AWS_IR command line tool.☆17Aug 4, 2016Updated 9 years ago
- AWS lambda function to ship ELB, S3, CloudTrail, VPC, CloudFront logs to Logmatic.io☆12Mar 5, 2018Updated 8 years ago
- ☆28Apr 26, 2023Updated 2 years ago
- Community Detection Signature Build and Distribution Pipeline for YARA, Suricata, Snort and Sigma☆27Jun 20, 2023Updated 2 years ago
- study material used for the 2018 CISSP exam☆11May 20, 2019Updated 6 years ago
- “Intelliroot Code Injection Hunter” is a tool that can to help you identify injected malicious code. The tool can identify and extract po…☆16Sep 21, 2022Updated 3 years ago
- Collection of Jupyter Notebook for Threat Hunting and Blue Team Purposes☆22Jun 15, 2022Updated 3 years ago
- Incident Response Plan for all major incidents including cheatsheets for both linux and windows☆13Jun 4, 2020Updated 5 years ago
- Incident Response Report Using GitHub-Sphinx☆20Oct 28, 2019Updated 6 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Demonstrates sending AWS SecurityHub findings to your email☆14Dec 14, 2018Updated 7 years ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Mar 1, 2021Updated 5 years ago
- rename☆19Jul 19, 2017Updated 8 years ago
- Generates runbooks for GuardDuty findings☆38Jun 24, 2024Updated last year
- Breaching physical security, and generally causing mayhem, with wireless signals☆15Mar 19, 2017Updated 9 years ago
- A browser based mapping tool to tie Kismet, Sparrow WiFi, and other RF related data sources into one interface.☆15Sep 6, 2021Updated 4 years ago
- Tor Web Scraper, dnmap CnC, and Forensic Disk Analyzer☆17May 25, 2017Updated 8 years ago
- Simple DLP monitor for AWS S3 is a tool built on top of CloudWatch events and Lambda functions to alert you when data is transferred to S…☆18Mar 4, 2020Updated 6 years ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- CDK app to setup an isolated AWS network to experiment with ways of exfiltrating data☆18Nov 18, 2021Updated 4 years ago
- AWS Metadata Proxy for protection against SSRF☆68Mar 3, 2020Updated 6 years ago
- Log4Shell IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆18Nov 25, 2022Updated 3 years ago
- Pre-configured response & remediation playbooks for AWS Security Hub☆65Nov 13, 2021Updated 4 years ago
- Collection of scripts and resources for DevSecOps and Automated Incident Response Security☆634Jan 14, 2026Updated 2 months ago
- Enable Falco to read audit logs from EKS☆11Dec 13, 2020Updated 5 years ago
- Run Sigma detection rules on logs from the new MacOS EndpointSecurity Framework☆22Jan 22, 2021Updated 5 years ago