There are no reviews yet. Be the first to send feedback to the community and the maintainers!
varc
Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of particular use when investigating a security incident.DFIR_Resources_REvil_Kaseya
Resources for DFIR Professionals Responding to the REvil Ransomware Kaseya Supply Chain Attackrip_raw
Rip Raw is a small tool to analyse the memory of compromised Linux systems.masked-ai
Masked Python SDK wrapper for OpenAI API. Use public LLM APIs securely.CloudAndContainerCompromiseSimulator
Simulates a compromise in a cloud and container environmentAWS_EKS_Cluster_Forensics
AWS EKS Cluster ForensicsMalwareAnalysis
MalwareAnalysisAwesome-Fargate-ECS-EKS-Security-Tools-and-Guides
Awesome Fargate & ECS & EKS Security Tools and GuidesDFIR_Resources_Industroyer2
IoCs and YARA rules for Industroyer2guardduty-lambda-cado
Go straight from Guard Duty alerts to Automated Investigations in AWS with Cado Responseproduct-help
Product help and user guideshellokitty-ransomware
Decoded HelloKitty Ransomwarectf-lambda-containers
Deployment-Templates
Contains a copy of the Terraform deployment templates for Cado Responseapi-reference
The documentation reference for the Cado platform's RESTful API.cado-poc-eks-cluster
Easily create a simple EKS cluster for testing EKS acquisition in the Cado platform.Engineering-Career-Ladder
The Engineering Career Ladder for Cado Securitylog4shell
Content to help the community responding to the Log4j Vulnerability Log4Shell CVE-2021-44228Love Open Source and this site? Check out how you can help us