AVML (Acquire Volatile Memory for Linux) View AVML (Acquire Volatile Memory for Linux)
MFT and USN parser for direct extraction in filesystem timeline format with YARA rule support.
Showing 11255 tools • Searched in 3ms
MFT and USN parser for direct extraction in filesystem timeline format with YARA rule support.
A vulnerable web site for testing Sentinel features
Detects and handles potential malware in Microsoft Exchange 2019 messages with various techniques and third-party libraries.
A comprehensive resource for threat hunting in Active Directory environments, covering tracking command-line/PowerShell activity, Kerberoasting detection, auditing attacker activity, and monitoring enterprise command-line activity.
Continually audit your AWS usage to simplify risk and compliance assessment.
Ice provides a birds-eye view of cloud resources and usage patterns in AWS.
Define and validate YARA rule metadata with CCCS YARA Specification.
Zeus is a powerful tool for AWS EC2 / S3 / CloudTrail / CloudWatch / KMS best hardening practices with a focus on Identity and Access Management.
A public incident response process documentation used at PagerDuty
Krampus is a security solution for managing AWS objects and can be used as a cost-control tool.
A community-driven GRC solution that is simple, affordable, and open-source.
An open-source credential management platform that provides end-to-end encrypted password sharing and storage capabilities for organizations.
A browser extension that helps you find and track sensitive data exposure across the web.
A remediation orchestration platform that consolidates security alerts, automates triage, and streamlines the remediation process across hybrid environments.
A dynamic GUI for advanced log analysis, allowing users to execute SQL queries on structured log data.
A data curation platform that automates security data collection, transformation and routing while reducing data volume and infrastructure costs.
Conmachi is a Golang tool for scanning container environments for security issues.
An attacker can create a new IAM policy version and set it as the default version without requiring the iam:SetDefaultPolicyVersion permission.
A tool to secure your shell commands history by clearing sensitive commands
A fully automated AD build script that configures a domain fully with adjustable XML files.
OpenIAM offers a unified identity governance platform featuring CIAM, MFA, and PAM integration.
A cloud native application protection platform that provides unified visibility, risk assessment, and remediation capabilities across multi-cloud and hybrid environments.
Securely store and access AWS credentials in a development environment.