ssm-acquire Logo

ssm-acquire

0
Free
Visit Website

A python module for orchestrating content acquisitions and analysis via Amazon SSM. Features include acquiring memory from a Linux instance to an S3 bucket using SSM, interrogating an instance for top-10 IOCs using OSQuery, analyzing a memory sample on a machine using Docker, and creating a rekall profile using an instance as a build target running the Amazon SSM Agent. This is a pre-release and is free software under the MPL 2.0 License. For more information, refer to the documentation at https://ssm-acquire.readthedocs.io.

FEATURES

ALTERNATIVES

Scripts to automate the process of enumerating a Linux system through a Local File Inclusion (LFI) vulnerability.

A toolkit for forensic analysis of network appliances with YARA decoding options and frame extraction capabilities.

A tool for fixing acquired .evt Windows Event Log files in digital forensics.

A high-performance digital forensics exploitation tool for extracting structured information from various inputs without parsing file system structures.

A collection of PowerShell modules for artifact gathering and reconnaissance of Windows-based endpoints.

A library to access and parse Windows XML Event Log (EVTX) format, useful for digital forensics and incident response.

GVfs is a userspace virtual filesystem implementation for GIO with various backends and features.

Hindsight is a free tool for analyzing web artifacts from Google Chrome/Chromium browsers and presenting the data in a timeline for forensic analysis.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved