wv8672 / AWS-Linux-Mem-DumpLinks
A Python, Boto3 script that leverages a forensic volume to attach & mount to a selected instance, run a memory dump, unmount and detach from the selected instance and finally attach & mount to a Forensic Workstation
☆12Updated 4 years ago
Alternatives and similar repositories for AWS-Linux-Mem-Dump
Users that are interested in AWS-Linux-Mem-Dump are comparing it to the libraries listed below
Sorting:
- Fun tools around the EBS Direct API☆18Updated 4 years ago
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Updated 6 years ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14Updated 3 weeks ago
- A few quick recipes for those that do not have much time during the day☆22Updated 7 months ago
- A meta-database collecting resources that compile lists of breaches☆20Updated 7 months ago
- ☆41Updated last year
- AWS EKS Cluster Forensics☆23Updated 3 years ago
- Tools for AWS forensics☆63Updated 9 years ago
- Updated incident response generator for training classes☆44Updated 4 years ago
- Use SQL to instantly query file, domain, URL and IP scanning results from VirusTotal.☆23Updated 2 weeks ago
- A packer utility to create and capture DFIR Image for use AWS & Azure☆15Updated 5 years ago
- Assess certain AWS network configurations☆12Updated 6 years ago
- Manage GuardDuty At Enterprise Scale☆22Updated 4 years ago
- Visualize your Terraform files☆34Updated 4 years ago
- Training scenarios for cyber ranges☆11Updated 5 years ago
- DEPRECATED: A set of utilities for converting and working with compliance data for viewing in the heimdall applications☆35Updated 3 years ago
- CloudSpec is an open source tool for validating your resources in your cloud providers using a logical language.☆26Updated 3 years ago
- The open source version of the AWS Security Hub documentation. To provide feedback or request changes, you can submit a pull request that…☆35Updated 2 years ago
- CDK app to setup an isolated AWS network to experiment with ways of exfiltrating data☆18Updated 3 years ago
- OpenCSPM Community Controls☆14Updated 4 years ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 3 years ago
- OSCAL SSP content for technologies shipped by Red Hat☆15Updated 2 years ago
- Knowledge Report Alert & Normalization Generator☆27Updated last year
- S3Insights is a platform for efficiently deriving security insights about S3 data through metadata analysis☆12Updated last week
- notes on configuring aws organizations☆11Updated 8 years ago
- Maturity Model Collaborative project☆15Updated 2 years ago
- Salesforce Policy Deviation Checker☆30Updated 4 years ago
- AWSATT&CK adds MITRE ATT&CK context and additional logging capabilities to Rhino Security Labs's open-source AWS exploitation framework, …☆45Updated 4 years ago
- A Lambda-powered Security Orchestration framework for AWS GuardDuty☆52Updated 5 years ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Updated 3 years ago