All Projects → 3CORESec → AWS-Mirror-Toolkit

3CORESec / AWS-Mirror-Toolkit

Licence: AGPL-3.0 license
A set of tools and procedures for automating NSM and NIDS deployments in AWS

Projects that are alternatives of or similar to AWS-Mirror-Toolkit

aws-waf-logger
Log all AWS WAF Matched Rules to S3 and/or Loggly using Serverless
Stars: ✭ 18 (+12.5%)
Mutual labels:  aws-security
Pacu
The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.
Stars: ✭ 2,451 (+15218.75%)
Mutual labels:  aws-security
pycommunityid
A Python implementation of the Community ID flow hashing standard
Stars: ✭ 18 (+12.5%)
Mutual labels:  network-security-monitoring
cfngoat
Cfngoat is Bridgecrew's "Vulnerable by Design" Cloudformation repository. Cfngoat is a learning and training project that demonstrates how common configuration errors can find their way into production cloud environments.
Stars: ✭ 70 (+337.5%)
Mutual labels:  aws-security
Security monkey
Security Monkey monitors AWS, GCP, OpenStack, and GitHub orgs for assets and their changes over time.
Stars: ✭ 4,244 (+26425%)
Mutual labels:  aws-security
community-id-spec
An open standard for hashing network flows into identifiers, a.k.a "Community IDs".
Stars: ✭ 137 (+756.25%)
Mutual labels:  network-security-monitoring
sandcastle
🏰 A Python script for AWS S3 bucket enumeration.
Stars: ✭ 53 (+231.25%)
Mutual labels:  aws-security
Jxnet
Jxnet is a Java library for capturing and sending custom network packet buffers with no copies. Jxnet wraps a native packet capture library (libpcap/winpcap/npcap) via JNI (Java Native Interface).
Stars: ✭ 26 (+62.5%)
Mutual labels:  network-security-monitoring
Terrascan
Detect compliance and security violations across Infrastructure as Code to mitigate risk before provisioning cloud native infrastructure.
Stars: ✭ 2,687 (+16693.75%)
Mutual labels:  aws-security
Zeek-Network-Security-Monitor
A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the necessary hardware and setup and finally provide some examples of how you can use the power of Zeek to have absolute control over your network.
Stars: ✭ 38 (+137.5%)
Mutual labels:  network-security-monitoring
awesome-cloud-security
🛡️ Awesome Cloud Security Resources ⚔️
Stars: ✭ 1,056 (+6500%)
Mutual labels:  aws-security
SyntheticSun
SyntheticSun is a defense-in-depth security automation and monitoring framework which utilizes threat intelligence, machine learning, managed AWS security services and, serverless technologies to continuously prevent, detect and respond to threats.
Stars: ✭ 49 (+206.25%)
Mutual labels:  aws-security
testmynids.org
A website and framework for testing NIDS detection
Stars: ✭ 55 (+243.75%)
Mutual labels:  network-security-monitoring
cdkgoat
CdkGoat is Bridgecrew's "Vulnerable by Design" AWS CDK repository. CdkGoat is a learning and training project that demonstrates how common configuration errors can find their way into production cloud environments.
Stars: ✭ 27 (+68.75%)
Mutual labels:  aws-security
Security Onion
Security Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management
Stars: ✭ 2,956 (+18375%)
Mutual labels:  network-security-monitoring
GDPatrol
A Lambda-powered Security Orchestration framework for AWS GuardDuty
Stars: ✭ 50 (+212.5%)
Mutual labels:  aws-security
Checkov
Prevent cloud misconfigurations during build-time for Terraform, Cloudformation, Kubernetes, Serverless framework and other infrastructure-as-code-languages with Checkov by Bridgecrew.
Stars: ✭ 3,572 (+22225%)
Mutual labels:  aws-security
introspector
A schema and set of tools for using SQL to query cloud infrastructure.
Stars: ✭ 61 (+281.25%)
Mutual labels:  aws-security
CloudFrontier
Monitor the internet attack surface of various public cloud environments. Currently supports AWS, GCP, Azure, DigitalOcean and Oracle Cloud.
Stars: ✭ 102 (+537.5%)
Mutual labels:  aws-security
nsm-attack
Mapping NSM rules to MITRE ATT&CK
Stars: ✭ 53 (+231.25%)
Mutual labels:  network-security-monitoring

AWS Mirror Toolkit

A set of tools to ease the creation of traffic mirror sessions, increase automation and facilitate maintenance.

image Open Source Love svg1

Tools

Currently available tools:

Even though these are separate projects they have been developed to complement each other. You're free to use them together or separately.

How do I use them?

For detailed instructions on how to use each tool please visit the repository of the project you're interested in.

Development objectives

The general availability of traffic mirror sessions in AWS is a great step towards traffic analyses. We did find, however, that using those features at scale could be hard to maintain and prone to error. The tools available here are our attempt at addressing these concerns.

Feedback

Found this interesting? Let us know!

Twitter

If you run into a bug, question or have a feature request, please open an issue in the specific project page.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].