telekom-security / acquire-aws-ec2
A python script to acquire multiple aws ec2 instances in a forensically sound-ish way
☆38Updated 3 years ago
Alternatives and similar repositories for acquire-aws-ec2:
Users that are interested in acquire-aws-ec2 are comparing it to the libraries listed below
- CSIRT Jump Bag☆27Updated 10 months ago
- A happy place for detection engineers, purple teamers and threat hunters focusing on macOS.☆21Updated 2 years ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆23Updated 3 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 4 months ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 4 years ago
- Windows Security Logging☆43Updated 2 years ago
- Powershell Scripts to work on Crowdstrike Falcon that pull back raw data relevant to forensic investigation☆22Updated 3 months ago
- Columbo is a computer forensic analysis tool used to simplify and identify specific patterns in compromised datasets.☆61Updated 3 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- Automatic detection engineering technical state compliance☆54Updated 8 months ago
- CyCAT.org API back-end server including crawlers☆30Updated 2 years ago
- The Intelligent Process Lifecycle of Active Cyber Defenders☆31Updated 2 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- pocket guide for core threat hunting concepts☆23Updated 4 years ago
- A packer utility to create and capture DFIR Image for use AWS & Azure☆15Updated 5 years ago
- Logbook for Digital Forensics and Incident Response☆50Updated 8 months ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 3 years ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Updated 2 years ago
- AWS EKS Cluster Forensics☆23Updated 3 years ago
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- Send High & New Incidents to The Hive incident management Platform☆18Updated 4 years ago
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.☆27Updated last year
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Updated 2 years ago
- ☆15Updated 3 years ago
- OpenIOC rules to facilitate hunting for indicators of compromise☆38Updated 3 years ago
- incident response scripts☆19Updated 6 years ago
- Dashboards for conducting forensic investigation using windows events in Kibana☆17Updated 5 years ago
- evtx2json extracts events of interest from event logs, dedups them, and exports them to json.☆41Updated 3 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 3 years ago
- pollen - A command-line tool for interacting with TheHive☆35Updated 5 years ago