Pinned Repositories
aiac
Artificial Intelligence Infrastructure-as-Code Generator.
amazon-inspector-agent-autodeploy
Lambda job in Python to automatically deploy Inspector agent to newly-launched EC2 instances
ansible-role-dhcp
Ansible role for setting up ISC DHCPD on RHEL/CentOS 7
Artificial-Intelligence-and-Machine-Learning
Algorithm implementations and homework solutions for the Stanford's online courses
automated-forensic-orchestrator-for-amazon-ec2
Automated Forensics Orchestrator for Amazon EC2 is a self-service AWS Solution implementation that enterprise customers can deploy to quickly set up and configure an automated orchestration workflow that enables their Security Operations Centre (SOC) to capture and examine data from EC2 instances and attached volumes as evidence for forensic analysis, in the event of a potential security breach. It will orchestrate the forensics process from the point at which a threat is first detected, enable isolation of the affected EC2 instances and data volumes, capture memory and disk images to secure storage, and trigger automated actions or tools for investigation and analysis of such artefacts. All the while, the solution will notify and report on its progress, status, and findings. It will enable SOC to continuously discover and analyze patterns of fraudulent activities across multi-account and multi-region environments. The solution will leverage native AWS services and be underpinned by a highly available, resilient, and serverless architecture, security, and operational monitoring features. Digital forensics is a 4 step process of triaging, acquisition, analysis and reporting. Automated Forensics framework provides capability to enterprise to act on security event by imaging or acquisition of breached resource for examination and generate forensic report about the security breach. In the event of a security breach, it will enable customers to easily to capture and examine required targeted data for forsensic’s storage and analysis. This solution framework enables security operations centre to discover and analyse patterns of fraudulent activities. The automated forensics solution will provide a multi-account and a multi-region [“solution”] built using native AWS services.
AutoSploit
Automated Mass Exploiter
awesome-incident-response
A curated list of tools for incident response
aws-elb-parse-logs
CyberArk
human-detector
Enigmatyk's Repositories
Enigmatyk/human-detector
Enigmatyk/aiac
Artificial Intelligence Infrastructure-as-Code Generator.
Enigmatyk/ansible-role-dhcp
Ansible role for setting up ISC DHCPD on RHEL/CentOS 7
Enigmatyk/automated-forensic-orchestrator-for-amazon-ec2
Automated Forensics Orchestrator for Amazon EC2 is a self-service AWS Solution implementation that enterprise customers can deploy to quickly set up and configure an automated orchestration workflow that enables their Security Operations Centre (SOC) to capture and examine data from EC2 instances and attached volumes as evidence for forensic analysis, in the event of a potential security breach. It will orchestrate the forensics process from the point at which a threat is first detected, enable isolation of the affected EC2 instances and data volumes, capture memory and disk images to secure storage, and trigger automated actions or tools for investigation and analysis of such artefacts. All the while, the solution will notify and report on its progress, status, and findings. It will enable SOC to continuously discover and analyze patterns of fraudulent activities across multi-account and multi-region environments. The solution will leverage native AWS services and be underpinned by a highly available, resilient, and serverless architecture, security, and operational monitoring features. Digital forensics is a 4 step process of triaging, acquisition, analysis and reporting. Automated Forensics framework provides capability to enterprise to act on security event by imaging or acquisition of breached resource for examination and generate forensic report about the security breach. In the event of a security breach, it will enable customers to easily to capture and examine required targeted data for forsensic’s storage and analysis. This solution framework enables security operations centre to discover and analyse patterns of fraudulent activities. The automated forensics solution will provide a multi-account and a multi-region [“solution”] built using native AWS services.
Enigmatyk/awesome-incident-response
A curated list of tools for incident response
Enigmatyk/aws-list-resources
Enigmatyk/Azure-Security-Center
Welcome to the Azure Security Center community repository
Enigmatyk/Azure-Sentinel
Cloud-native SIEM for intelligent security analytics for your entire enterprise.
Enigmatyk/BurpSuite-For-Pentester
Enigmatyk/canary-utils
Collection of useful Canary tools
Enigmatyk/CanaryHunter
Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org
Enigmatyk/cariddi
Take a list of domains, crawl urls and scan for endpoints, secrets, api keys, file extensions, tokens and more
Enigmatyk/CloudPentestCheatsheets
This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage cloud providers.
Enigmatyk/content
Demisto is now Cortex XSOAR. Automate and orchestrate your Security Operations with Cortex XSOAR's ever-growing Content Repository. Pull Requests are always welcome and highly appreciated!
Enigmatyk/dgc-cli
Command Line Tool for European Digital Green Certificate project.
Enigmatyk/evilarc
Create tar/zip archives that can exploit directory traversal vulnerabilities
Enigmatyk/EvilRAT
Undetectable payload for Windows 10 and 11
Enigmatyk/EZEA
EZEA (EaZy Enum Automator), made for OSCP. This tool uses bash to automate most of the enumeration proces
Enigmatyk/Gel4y-Mini-Shell-Backdoor
A webshell that can bypass some system security
Enigmatyk/ggcanary
GitGuardian Canary Tokens
Enigmatyk/hakrawler
Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application
Enigmatyk/hugo-theme-hello-friend
Pretty basic theme for Hugo that covers all of the essentials. All you have to do is start typing!
Enigmatyk/installer
Install an OpenShift 4.x cluster
Enigmatyk/jsfuck
Write any JavaScript with 6 Characters: []()!+
Enigmatyk/LaTeX-OCR
pix2tex: Using a ViT to convert images of equations into LaTeX code.
Enigmatyk/MicroBurst
A collection of scripts for assessing Microsoft Azure security
Enigmatyk/monitoring-discord-webhook
Script to send monitoring (e.g. Icinga2) notifications to Discord via webhook
Enigmatyk/nessuskeygen
This Python script allows you to generate Nessus Professional Keys directly without having to fill out the registration form. It simplifies the process and makes it more convenient for users to get started with Nessus.
Enigmatyk/public-pentesting-reports
Curated list of public penetration test reports released by several consulting firms and academic security groups
Enigmatyk/SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.