Tools for AWS forensics
☆65Mar 4, 2016Updated 10 years ago
Alternatives and similar repositories for aws-forensic-tools
Users that are interested in aws-forensic-tools are comparing it to the libraries listed below
Sorting:
- Creates a CloudFormation stack for running Security Monkey☆27Mar 21, 2019Updated 6 years ago
- AWS Live Response☆11Sep 19, 2017Updated 8 years ago
- Remote Memory Acquisition Tool☆253Sep 22, 2020Updated 5 years ago
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Jul 7, 2018Updated 7 years ago
- MacOS incident Response Toolkit. Mostly written while stuck on a NJTransit train.☆20Feb 20, 2020Updated 6 years ago
- Python installable command line utiltity for mitigation of host and key compromises.☆347Jul 23, 2021Updated 4 years ago
- Tools for DFIR☆120Jan 25, 2018Updated 8 years ago
- Materials used and mentioned during my talk at SANS Cloud Security Summit 2018 in San Diego☆23Feb 19, 2018Updated 8 years ago
- Training materials I've written.☆11Nov 11, 2025Updated 3 months ago
- Visualizing Path Finding using A* algorithm☆14Nov 7, 2022Updated 3 years ago
- A small pentesting lab for Azure☆10Apr 19, 2019Updated 6 years ago
- Jupyter Notebooks for Digital Forensics & Incident Response☆10Nov 23, 2021Updated 4 years ago
- Server for receiving autorun data from the clients☆13Sep 26, 2017Updated 8 years ago
- Public tables and other research that can accept PRs. Please visit the web link.☆44Aug 30, 2019Updated 6 years ago
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.☆31Jul 12, 2023Updated 2 years ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- Wintermute Endpoint Search: Parse source code pulling out endpoints, parameters, and a bunch of other stuff☆14May 20, 2019Updated 6 years ago
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆14Aug 15, 2022Updated 3 years ago
- Collection of snippets for devtools.☆13Mar 17, 2021Updated 4 years ago
- ☆10Feb 22, 2023Updated 3 years ago
- Actual good v3 onion links☆15Jan 19, 2026Updated last month
- ElasticSearch vulnerable scanner☆16Oct 6, 2019Updated 6 years ago
- Collection of the cheat sheets useful for pentesting☆10May 11, 2018Updated 7 years ago
- Capture-The-Flag(CTF) toolkit☆11Jan 8, 2015Updated 11 years ago
- A Windows PowerShell & PowerShell Core Module to calculate a CVSS3 Score based on a Vector string☆12Dec 20, 2022Updated 3 years ago
- A burp extension to generate sqlmap PoC from target HTTP request.☆27Jan 8, 2017Updated 9 years ago
- ☆375Feb 23, 2024Updated 2 years ago
- Go static analysis tool that checks for security issues using an AST.☆29Nov 19, 2018Updated 7 years ago
- A python module for orchestrating content acquisitions and analysis via amazon ssm.☆58Nov 2, 2023Updated 2 years ago
- Run DependencyCheck Against Your Orgs GitHub Repos.☆14Jan 5, 2018Updated 8 years ago
- ☆15Apr 13, 2021Updated 4 years ago
- This automation protect against subdomain takeover on AWS env which also send alerts on slack.☆12Aug 1, 2021Updated 4 years ago
- Sechead is a powerful security tool developed in Python that allows users to audit the security headers of any website. With Sechead, use…☆13May 22, 2023Updated 2 years ago
- Tool to manage user privileges☆31Sep 4, 2019Updated 6 years ago
- shell script to create an image and perform initial examination on a drive☆15Feb 28, 2020Updated 6 years ago
- Builder Repository for Coreboot with Tianocore Firmware☆13Feb 16, 2026Updated 2 weeks ago
- ☆17Apr 13, 2018Updated 7 years ago
- ☆15Feb 5, 2022Updated 4 years ago
- Identify web application versions☆18Apr 14, 2017Updated 8 years ago