wv8672 / AWS-Linux-Mem-DumpLinks
A Python, Boto3 script that leverages a forensic volume to attach & mount to a selected instance, run a memory dump, unmount and detach from the selected instance and finally attach & mount to a Forensic Workstation
☆12Updated 5 years ago
Alternatives and similar repositories for AWS-Linux-Mem-Dump
Users that are interested in AWS-Linux-Mem-Dump are comparing it to the libraries listed below
Sorting:
- An ongoing collection of of AWS tools, frameworks, libraries, learning tutorials for InfoSec and security professionals☆24Updated 3 years ago
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆22Updated 7 years ago
- Tools for AWS forensics☆63Updated 9 years ago
- ☆41Updated 2 months ago
- Defensive S3 Bucket Squating☆30Updated 7 years ago
- AWS EKS Cluster Forensics☆23Updated 4 years ago
- Fun tools around the EBS Direct API☆19Updated 4 years ago
- CDK app to setup an isolated AWS network to experiment with ways of exfiltrating data☆18Updated 3 years ago
- The open source version of the AWS Security Hub documentation. To provide feedback or request changes, you can submit a pull request that…☆35Updated 2 years ago
- DEPRECATED: A set of utilities for converting and working with compliance data for viewing in the heimdall applications☆35Updated 3 years ago
- A meta-database collecting resources that compile lists of breaches☆21Updated 11 months ago
- A Lambda-powered Security Orchestration framework for AWS GuardDuty☆53Updated 5 years ago
- SyntheticSun is a defense-in-depth security automation and monitoring framework which utilizes threat intelligence, machine learning, man…☆80Updated 4 years ago
- Linux, macOS and Windows Install scripts for cnquery & cnspec☆84Updated last week
- OSCAL SSP content for technologies shipped by Red Hat☆15Updated 2 years ago
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆54Updated last year
- Updated incident response generator for training classes☆44Updated 4 years ago
- An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share th…☆14Updated 4 years ago
- Application Security Workflow Automation using Docker and Kubernetes☆22Updated 2 years ago
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.☆30Updated 2 years ago
- AWSATT&CK adds MITRE ATT&CK context and additional logging capabilities to Rhino Security Labs's open-source AWS exploitation framework, …☆46Updated 4 years ago
- Tools to automate AWS Cloud security assessments☆24Updated 5 years ago
- Example Suricata rules implementing some of my detection tactics☆21Updated 2 years ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 3 years ago
- Use SQL to instantly query host, DNS and exploit information using Shodan. Open source CLI. No DB required.☆29Updated 3 weeks ago
- Visualize your Terraform files☆34Updated 5 years ago
- This script is used to generate some basic detections of the aws security services☆71Updated 3 years ago
- Lightspin AWS IAM Vulnerability Scanner☆95Updated 4 years ago
- CloudSplaining on AWS Managed Policies☆44Updated 3 weeks ago
- Security Alert Decoration☆27Updated 2 months ago