varc
aws-allowlister
varc | aws-allowlister | |
---|---|---|
5 | 3 | |
232 | 218 | |
1.3% | 0.5% | |
3.5 | 0.0 | |
7 months ago | 9 months ago | |
Python | Python | |
GNU General Public License v3.0 only | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
varc
- GitHub - cado-security/varc: Volatile Artifact Collector -- Open Source Tool to Collect Volatile Data for Incident Response
- Open source tool for collecting volatile data on compromised systems
- Varc - Volatile Artifact Collector
- varc - Open Source tool for Volatile Artifact Collection
- Open Source Tool to Collect Volatile Data for Incident Response
aws-allowlister
What are some alternatives?
turbinia - Automation and Scaling of Digital Forensics Tools
trailscraper - A command-line tool to get valuable information out of AWS CloudTrail
metabadger - Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).
Aura2LWC - This VSCode Extension automatically converts Aura Components to LWC
introspector - A schema and set of tools for using SQL to query cloud infrastructure.
cloudsplaining - Cloudsplaining is an AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized report.
AWSXenos - AWSXenos will list all the trust relationships in all the IAM roles and S3 buckets
timesketch - Collaborative forensic timeline analysis
prowler - Prowler is an Open Source Security tool for AWS, Azure, GCP and Kubernetes to do security assessments, audits, incident response, compliance, continuous monitoring, hardening and forensics readiness. Includes CIS, NIST 800, NIST CSF, CISA, FedRAMP, PCI-DSS, GDPR, HIPAA, FFIEC, SOC2, GXP, Well-Architected Security, ENS and more
policy_sentry - IAM Least Privilege Policy Generator