A python module for orchestrating content acquisitions and analysis via amazon ssm.
☆58Nov 2, 2023Updated 2 years ago
Alternatives and similar repositories for ssm-acquire
Users that are interested in ssm-acquire are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- AWS Metadata Proxy for protection against SSRF☆68Mar 3, 2020Updated 6 years ago
- Web based analysis platform for use with the AWS_IR command line tool.☆17Aug 4, 2016Updated 9 years ago
- Remote Memory Acquisition Tool☆253Sep 22, 2020Updated 5 years ago
- A Step Functions microservice for remediating GuardDuty findings.☆18Nov 7, 2022Updated 3 years ago
- Python installable command line utiltity for mitigation of host and key compromises.☆347Jul 23, 2021Updated 4 years ago
- CloudSpec is an open source tool for validating your resources in your cloud providers using a logical language.☆26Jan 4, 2022Updated 4 years ago
- Incident Response and Forensic on AWS☆20May 19, 2020Updated 5 years ago
- Varna: Quick & Cheap AWS CloudTrail Monitoring with Event Query Language (EQL)☆52Dec 26, 2022Updated 3 years ago
- Minimalist containerized implementation of Prowler from https://github.com/toniblyx/prowler, made to run within ECS Fargate and have Secr…☆18May 17, 2019Updated 6 years ago
- ☆83Dec 5, 2019Updated 6 years ago
- Workshop on how to implement automated remediations of findings submitted to AWS Security Hub leveraging an open source tool named Cloud …☆22Jun 8, 2021Updated 4 years ago
- ☆159Jul 8, 2023Updated 2 years ago
- ☆375Feb 23, 2024Updated 2 years ago
- Creates a CloudFormation stack for running Security Monkey☆27Mar 21, 2019Updated 7 years ago
- ReviveIT (revit) is a proof of concept file recovery tool (carver)☆13Dec 3, 2020Updated 5 years ago
- SkyWrapper helps to discover suspicious creation forms and uses of temporary tokens in AWS☆108Mar 25, 2021Updated 4 years ago
- Deep Security's APIs make it simple to integration with a variety of AWS Services☆19Apr 24, 2019Updated 6 years ago
- CloudTracker helps you find over-privileged IAM users and roles by comparing CloudTrail logs with current IAM policies.☆908Dec 17, 2021Updated 4 years ago
- Github action for linting AWS IAM policy documents☆38Jan 20, 2023Updated 3 years ago
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Jul 7, 2018Updated 7 years ago
- This is a collection of AWS CloudFormation templates which create Lambda functions triggered by CloudWatch Events rule to evaluate AWS AP…☆54Jan 14, 2026Updated 2 months ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Jul 18, 2018Updated 7 years ago
- A MITRE ATT&CK Navigator export for AWS GuardDuty Findings☆139Jul 23, 2021Updated 4 years ago
- Open source application to instantly remediate common security issues through the use of AWS Config☆219Sep 3, 2020Updated 5 years ago
- Collection of my test rules and Submissions to Emerging-Sigs☆11Apr 22, 2016Updated 9 years ago
- Library for Object Linking and Embedding (OLE) data types☆12Nov 27, 2025Updated 3 months ago
- Server for receiving autorun data from the clients☆13Sep 26, 2017Updated 8 years ago
- Proof of concept incident response demo using SSM and AWS Fargate.☆14Dec 5, 2019Updated 6 years ago
- AWS Security Tools (AST) in a simple Docker container.☆284May 20, 2021Updated 4 years ago
- AWS Live Response☆11Sep 19, 2017Updated 8 years ago
- Library and tools to access the Windows Hibernation File (hiberfil.sys) format☆13Dec 20, 2025Updated 3 months ago
- A dataset with CloudTrail events from an attack simulation using Stratus.☆25Jul 12, 2023Updated 2 years ago
- Duo MFA auditing tool to test users' likelihood of approving unexpected push notifications☆13Apr 20, 2018Updated 7 years ago
- AWS Terraform module to create an S3 Squid proxy farm on AWS☆13Oct 16, 2018Updated 7 years ago
- IAM modules and YML-based terraform configuration generator☆18Nov 5, 2025Updated 4 months ago
- Python library to carry out DFIR analysis on the Cloud☆502Mar 2, 2026Updated 3 weeks ago
- SyntheticSun is a defense-in-depth security automation and monitoring framework which utilizes threat intelligence, machine learning, man…☆82Jul 8, 2021Updated 4 years ago
- A collection of Yara rules I have created so far☆16Oct 26, 2020Updated 5 years ago
- Run DependencyCheck Against Your Orgs GitHub Repos.☆14Jan 5, 2018Updated 8 years ago