A python script to acquire multiple aws ec2 instances in a forensically sound-ish way
☆38Nov 8, 2021Updated 4 years ago
Alternatives and similar repositories for acquire-aws-ec2
Users that are interested in acquire-aws-ec2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- /ˈhäjˌpäj/ "a confused mixture."☆13Mar 17, 2026Updated last week
- ☆11Aug 3, 2018Updated 7 years ago
- Windows 10 Live Information viewer☆38Jan 27, 2022Updated 4 years ago
- macOS Artifact Intelligence Tool☆13Apr 30, 2019Updated 6 years ago
- A small tool to easily mount APFS image on macOS for forensics.☆16Jul 30, 2020Updated 5 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A small util to brute-force prefetch hashes☆77Jun 24, 2022Updated 3 years ago
- android-sms2csv.py extract SMS messages from Android backup files☆13Jun 19, 2020Updated 5 years ago
- Visual-based analysis of file system metadata. The tool enables digital forensics of large volumes of data.☆10May 10, 2024Updated last year
- Recover lost code from SOURCEdefender encrypted files☆13Aug 25, 2025Updated 7 months ago
- ☆93Jul 30, 2025Updated 7 months ago
- Enable Falco to read audit logs from EKS☆11Dec 13, 2020Updated 5 years ago
- Parse Chrome History and Downloads into TSV or TLN format☆16Sep 3, 2016Updated 9 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Feb 19, 2023Updated 3 years ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆24Jul 9, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Python tool to find vulnerable AD object and generating csv report☆14Jul 4, 2022Updated 3 years ago
- An efficient tool for search files, directories, and alternate data streams directly from NTFS image files.☆28Mar 12, 2026Updated 2 weeks ago
- Google Filestream Forensic Tool☆22Mar 10, 2022Updated 4 years ago
- ☆21Jan 28, 2026Updated 2 months ago
- Elastic Security Labs' malware analysis and reverse engineering library☆53Mar 10, 2026Updated 2 weeks ago
- ARDvark parses the Apple Remote Desktop (ARD) files to pull out application usage, user activity, and filesystem listings.☆36Jun 1, 2023Updated 2 years ago
- ☆25Jul 23, 2024Updated last year
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Jan 21, 2020Updated 6 years ago
- ☆24Mar 12, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆16Aug 19, 2021Updated 4 years ago
- Quick iOS Backup UnFunkerizor☆22May 25, 2021Updated 4 years ago
- Extract files from ADB devices on Windows, Linux and MacOS. Mostly a wrapper for adbutils.☆44Updated this week
- A preconfigured Windows-based system designed for rapid forensic investigations in both Azure and AWS.☆38Mar 25, 2024Updated 2 years ago
- RDP Checker☆64Feb 23, 2024Updated 2 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆70Feb 3, 2022Updated 4 years ago
- Harvest Linux forensic data for operational triage of an event.☆51Nov 30, 2025Updated 3 months ago
- Updated incident response generator for training classes☆43Jun 2, 2021Updated 4 years ago
- An API for ssh_scan (https://github.com/mozilla/ssh_scan) and the backend API service for the Mozilla SSH Observatory (https://observator…☆32Feb 16, 2021Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Yara rules☆22Mar 27, 2023Updated 3 years ago
- A script to mine SQLite databases for hidden gems that might be overlooked☆58Sep 19, 2020Updated 5 years ago
- Generate YARA rules for OOXML documents.☆38Jun 1, 2023Updated 2 years ago
- The CRATOS proxy API integrates with your MISP instance and allows to extract indicators that can be consumed by security components such…☆13Sep 21, 2025Updated 6 months ago
- Module(s) related to reading SEGB (fka "Biome") data from iOS, mascOS, etc.☆29Sep 9, 2025Updated 6 months ago
- Jar2Exe extraction tool☆15Dec 28, 2022Updated 3 years ago
- A parser of Windows Defender's DetectionHistory forensic artifact, containing substantial info about quarantined files and executables.☆117Jan 26, 2022Updated 4 years ago