2017-11-09 16:28:15 +00:00
# My Awesome
[![Awesome ](https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg )](https://github.com/sindresorhus/awesome)
2017-11-09 16:34:53 +00:00
[![travis-banner ](https://travis-ci.org/pe3zx/my-awesome.svg?branch=master )](https://travis-ci.org/pe3zx/my-awesome)
2017-11-09 16:28:15 +00:00
2017-11-09 16:11:18 +00:00
My curated list of awesome links, resources and tools
2017-11-09 16:28:15 +00:00
- [My Awesome ](#my-awesome )
- [Articles ](#article )
- [Tools ](#tools )
2017-11-09 17:18:31 +00:00
- [AWS Security ](#aws-security )
2017-11-09 17:29:30 +00:00
- [Binary Analysis ](#binary-analysis )
2017-11-09 17:47:26 +00:00
- [Digital Forensics and Incident Response ](#digital-forensics-and-incident-response )
2017-11-09 16:28:15 +00:00
---
## Articles
## Tools
2017-11-09 17:18:31 +00:00
### AWS Security
2017-11-09 16:28:15 +00:00
2017-11-09 17:08:01 +00:00
*Open source projects related to AWS security.*
2017-11-09 16:28:15 +00:00
2017-11-09 16:52:19 +00:00
< table >
< tr >
< td >
< a href = "https://github.com/airbnb/BinaryAlert" target = "_blank" > airbnb/BinaryAlert< / a >
< / td >
< td >
BinaryAlert: Serverless, Real-time & Retroactive Malware Detection
< / td >
< / tr >
< tr >
< td >
< a href = "https://github.com/cloudsploit/scans" target = "_blank" > cloudsploit/scans< / a >
< / td >
< td >
AWS security scanning checks
< / td >
< / tr >
< tr >
< td >
< a href = "https://github.com/nccgroup/Scout2" target = "_blank" > nccgroup/Scout2< / a >
< / td >
< td >
Security auditing tool for AWS environments
< / td >
< / tr >
< tr >
< td >
< a href = "https://github.com/Netflix/security_monkey" target = "_blank" > Netflix/security_monkey< / a >
< / td >
< td >
Security Monkey monitors your AWS and GCP accounts for policy changes and alerts on insecure configurations.
< / td >
< / tr >
< tr >
< td >
< a href = "https://github.com/Alfresco/prowler" target = "_blank" > Alfresco/prowler< / a >
< / td >
< td >
Tool for AWS security assessment, auditing and hardening. It follows guidelines of the CIS Amazon Web Services Foundations Benchmark.
< / td >
< / tr >
< / table >
2017-11-09 17:29:30 +00:00
### Binary Analysis
*Binary analysis tools, including decompilers, deobfuscators, disassemblers, etc.*
< table >
2017-11-09 17:35:30 +00:00
< tr >
< td >
< a href = "https://github.com/fireeye/flare-floss" > fireeye/flare-floss< / a >
< / td >
< td >
FireEye Labs Obfuscated String Solver - Automatically extract obfuscated strings from malware.
< / td >
< / tr >
2017-11-09 17:29:30 +00:00
< tr >
< td >
< a href = "https://github.com/katjahahn/PortEx" target = "_blank" > katjahahn/PortEx< / a >
< / td >
< td >
Java library to analyse Portable Executable files with a special focus on malware analysis and PE malformation robustness
< / td >
< / tr >
2017-11-09 17:35:30 +00:00
< tr >
< td >
< a href = "https://github.com/williballenthin/python-idb" > williballenthin/python-idb< / a >
< / td >
< td >
Pure Python parser and analyzer for IDA Pro database files (.idb).
< / td >
< / tr >
2017-11-09 17:29:30 +00:00
< / table >
2017-11-09 17:47:26 +00:00
### Digital Forensics and Incident Response
*Open source projects related to DFIR topic.*
< table >
< tr >
< td >
< a href = "https://github.com/Invoke-IR/PowerForensics" > Invoke-IR/PowerForensics< / a >
< / td >
< td >
PowerForensics provides an all in one platform for live disk forensic analysis
< / td >
< / tr >
< tr >
< td >
< a href = "https://github.com/nannib/Imm2Virtual" > nannib/Imm2Virtual< / a >
< / td >
< td >
This is a GUI (for Windows 64 bit) for a procedure to virtualize your EWF(E01), DD(Raw), AFF disk image file without converting it, directly with VirtualBox, forensically proof.
< / td >
< / tr >
< tr >
< td >
< a href = "https://github.com/nshalabi/SysmonTools" > nshalabi/SysmonTools< / a >
< / td >
< td >
Utilities for Sysmon (Sysmon View and Sysmon Shell)
< / td >
< / tr >
< tr >
< td >
< a href = "https://github.com/THIBER-ORG/userline" > THIBER-ORG/userline< / a >
< / td >
< td >
Query and report user logons relations from MS Windows Security Events
< / td >
< / tr >
< tr >
< td >
< a href = "https://github.com/TryCatchHCF/DumpsterFire" > TryCatchHCF/DumpsterFire< / a >
< / td >
< td >
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequence…
< / td >
< / tr >
< / table >