• Stars
    star
    2
  • Language
  • Created almost 2 years ago
  • Updated over 1 year ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

More Repositories

1

varc

Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of particular use when investigating a security incident.
Python
175
star
2

DFIR_Resources_REvil_Kaseya

Resources for DFIR Professionals Responding to the REvil Ransomware Kaseya Supply Chain Attack
C
174
star
3

rip_raw

Rip Raw is a small tool to analyse the memory of compromised Linux systems.
Python
130
star
4

masked-ai

Masked Python SDK wrapper for OpenAI API. Use public LLM APIs securely.
Python
67
star
5

CloudAndContainerCompromiseSimulator

Simulates a compromise in a cloud and container environment
Shell
28
star
6

AWS_EKS_Cluster_Forensics

AWS EKS Cluster Forensics
22
star
7

MalwareAnalysis

MalwareAnalysis
C#
11
star
8

DFIR_Resources_Whispergate

Resources for DFIR Professionals Responding to the Whispergate
C#
9
star
9

Awesome-Fargate-ECS-EKS-Security-Tools-and-Guides

Awesome Fargate & ECS & EKS Security Tools and Guides
7
star
10

DFIR_Resources_Industroyer2

IoCs and YARA rules for Industroyer2
YARA
7
star
11

guardduty-lambda-cado

Go straight from Guard Duty alerts to Automated Investigations in AWS with Cado Response
Python
4
star
12

product-help

Product help and user guides
JavaScript
3
star
13

hellokitty-ransomware

Decoded HelloKitty Ransomware
C
3
star
14

Deployment-Templates

Contains a copy of the Terraform deployment templates for Cado Response
HCL
2
star
15

cado-poc-eks-cluster

Easily create a simple EKS cluster for testing EKS acquisition in the Cado platform.
Shell
2
star
16

Engineering-Career-Ladder

The Engineering Career Ladder for Cado Security
1
star
17

log4shell

Content to help the community responding to the Log4j Vulnerability Log4Shell CVE-2021-44228
1
star