Cado Security
Cloud Investigation and Response Automation. Effortlessly gain forensic-level detail into cloud, container and serverless environments.
London
Pinned Repositories
AWS_EKS_Cluster_Forensics
AWS EKS Cluster Forensics
CloudAndContainerCompromiseSimulator
Simulates a compromise in a cloud and container environment
cloudgrep
cloudgrep is grep for cloud storage
DFIR_Resources_Industroyer2
IoCs and YARA rules for Industroyer2
DFIR_Resources_REvil_Kaseya
Resources for DFIR Professionals Responding to the REvil Ransomware Kaseya Supply Chain Attack
DFIR_Resources_Whispergate
Resources for DFIR Professionals Responding to the Whispergate
MalwareAnalysis
MalwareAnalysis
masked-ai
Masked Python SDK wrapper for OpenAI API. Use public LLM APIs securely.
rip_raw
Rip Raw is a small tool to analyse the memory of compromised Linux systems.
varc
Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of particular use when investigating a security incident.
Cado Security's Repositories
cado-security/cloudgrep
cloudgrep is grep for cloud storage
cado-security/varc
Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of particular use when investigating a security incident.
cado-security/DFIR_Resources_REvil_Kaseya
Resources for DFIR Professionals Responding to the REvil Ransomware Kaseya Supply Chain Attack
cado-security/rip_raw
Rip Raw is a small tool to analyse the memory of compromised Linux systems.
cado-security/masked-ai
Masked Python SDK wrapper for OpenAI API. Use public LLM APIs securely.
cado-security/CloudAndContainerCompromiseSimulator
Simulates a compromise in a cloud and container environment
cado-security/AWS_EKS_Cluster_Forensics
AWS EKS Cluster Forensics
cado-security/MalwareAnalysis
MalwareAnalysis
cado-security/DFIR_Resources_Whispergate
Resources for DFIR Professionals Responding to the Whispergate
cado-security/Awesome-Fargate-ECS-EKS-Security-Tools-and-Guides
Awesome Fargate & ECS & EKS Security Tools and Guides
cado-security/DFIR_Resources_Industroyer2
IoCs and YARA rules for Industroyer2
cado-security/guardduty-lambda-cado
Go straight from Guard Duty alerts to Automated Investigations in AWS with Cado Response
cado-security/Engineering-Career-Ladder
The Engineering Career Ladder for Cado Security
cado-security/hellokitty-ransomware
Decoded HelloKitty Ransomware
cado-security/product-help
Product help and user guides
cado-security/api-reference
The documentation reference for the Cado platform's RESTful API.
cado-security/cado-api-examples
Code examples for integrate with Cado API
cado-security/cado-poc-eks-cluster
Easily create a simple EKS cluster for testing EKS acquisition in the Cado platform.
cado-security/ctf-lambda-containers
cado-security/Deployment-Templates
Contains a copy of the Terraform deployment templates for Cado Response
cado-security/Cado-Batch
A Batch script to collect forensic evidence from older Windows systems
cado-security/gcp-setup
Scripts to aid in automating setup of GCP environment to support acquisition by Cado
cado-security/kape-wannacry
An example collection of a system infected with WannaCry then collected with KAPE (Kroll Artifact Parser And Extractor)
cado-security/log4shell
Content to help the community responding to the Log4j Vulnerability Log4Shell CVE-2021-44228
cado-security/wiper_feb_2022
Detects Wiper seen in Ukraine 23rd Feb 2022
cado-security/auto_ec2_lambda
AWS Lambda function to continuously, automatically capture EC2 systems into Cado Platform
cado-security/cado-tines-stories
Tines Stories with Cado Platform
cado-security/content
Demisto is now Cortex XSOAR. Automate and orchestrate your Security Operations with Cortex XSOAR's ever-growing Content Repository. Pull Requests are always welcome and highly appreciated!
cado-security/deprecated-free-tools
Old tools for the community. No longer supported by Cado Security.
cado-security/docker-forensics-example-data
Malicious Docker Images from https://unit42.paloaltonetworks.com/malicious-cryptojacking-images/