wv8672 / AWS-Linux-Mem-DumpLinks
A Python, Boto3 script that leverages a forensic volume to attach & mount to a selected instance, run a memory dump, unmount and detach from the selected instance and finally attach & mount to a Forensic Workstation
☆12Updated 5 years ago
Alternatives and similar repositories for AWS-Linux-Mem-Dump
Users that are interested in AWS-Linux-Mem-Dump are comparing it to the libraries listed below
Sorting:
- Application Security Workflow Automation using Docker and Kubernetes☆23Updated 2 years ago
- Tools to automate AWS Cloud security assessments☆24Updated 5 years ago
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Updated 7 years ago
- Tools for AWS forensics☆64Updated 9 years ago
- Visualize your Terraform files☆34Updated 5 years ago
- Fun tools around the EBS Direct API☆19Updated 4 years ago
- OSCAL SSP content for technologies shipped by Red Hat☆15Updated 2 years ago
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆54Updated last year
- Linux, macOS and Windows Install scripts for cnquery & cnspec☆84Updated last week
- An ongoing collection of of AWS tools, frameworks, libraries, learning tutorials for InfoSec and security professionals☆24Updated 3 years ago
- Defensive S3 Bucket Squating☆30Updated 7 years ago
- A Lambda-powered Security Orchestration framework for AWS GuardDuty☆53Updated 5 years ago
- AWS EKS Cluster Forensics☆23Updated 4 years ago
- DEPRECATED: A set of utilities for converting and working with compliance data for viewing in the heimdall applications☆35Updated 3 years ago
- Security Alert Decoration☆27Updated 3 months ago
- Use SQL to instantly query host, DNS and exploit information using Shodan. Open source CLI. No DB required.☆29Updated 3 weeks ago
- OpenCSPM Community Controls☆14Updated 4 years ago
- A meta-database collecting resources that compile lists of breaches☆21Updated last week
- Dockerfiles for containerized osquery☆14Updated 8 years ago
- Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/)☆89Updated 2 years ago
- A Security Results Viewer for the web with storage, teams and history☆35Updated 2 years ago
- Updated incident response generator for training classes☆44Updated 4 years ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14Updated 5 months ago
- Short deep dive into Threat Hunting on AWS☆14Updated 2 years ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 4 years ago
- Training scenarios for cyber ranges☆12Updated 5 years ago
- Salesforce Policy Deviation Checker☆30Updated 5 years ago
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆11Updated 3 years ago
- Example Suricata rules implementing some of my detection tactics☆22Updated 2 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆17Updated 4 years ago