{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"product-help","owner":"cado-security","isFork":false,"description":"Product help and user guides","allTopics":[],"primaryLanguage":{"name":"JavaScript","color":"#f1e05a"},"pullRequestCount":1,"issueCount":0,"starsCount":3,"forksCount":5,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-03T12:41:47.940Z"}},{"type":"Public","name":"Deployment-Templates","owner":"cado-security","isFork":false,"description":"Contains a copy of the Terraform deployment templates for Cado Response","allTopics":[],"primaryLanguage":{"name":"HCL","color":"#844FBA"},"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":0,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-31T08:27:32.579Z"}},{"type":"Public","name":"cloudgrep","owner":"cado-security","isFork":false,"description":"cloudgrep is grep for cloud storage","allTopics":["search","aws","cloud","azure","aws-s3","gcp","grep","aws-security","cloud-security","azure-security","gcp-security"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":290,"forksCount":14,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-13T12:43:11.072Z"}},{"type":"Public","name":"cado-poc-eks-cluster","owner":"cado-security","isFork":false,"description":"Easily create a simple EKS cluster for testing EKS acquisition in the Cado platform.","allTopics":[],"primaryLanguage":{"name":"Shell","color":"#89e051"},"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-19T11:28:19.179Z"}},{"type":"Public","name":"cado-api-examples","owner":"cado-security","isFork":false,"description":"Code examples for integrate with Cado API","allTopics":["api","cado-security"],"primaryLanguage":null,"pullRequestCount":1,"issueCount":0,"starsCount":2,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-12-05T09:55:07.007Z"}},{"type":"Public","name":"Engineering-Career-Ladder","owner":"cado-security","isFork":false,"description":"The Engineering Career Ladder for Cado Security","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":3,"forksCount":1,"license":"Creative Commons Zero v1.0 Universal","participation":[0,0,0,0,0,0,0,0,0,0,0,0,3,0,0,0,0,0,0,0,1,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-10-25T10:42:14.566Z"}},{"type":"Public","name":"varc","owner":"cado-security","isFork":false,"description":"Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of particular use when investigating a security incident.","allTopics":["security","aws-lambda","forensics","dfir","hacktoberfest","memory-forensics","cloud-security","aws-fargate","dfir-automation","docker-forensics","aws-forensics","eks-forensics","fargate-forensics","aws"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":2,"issueCount":0,"starsCount":234,"forksCount":12,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-09-30T12:10:24.992Z"}},{"type":"Public","name":"gcp-setup","owner":"cado-security","isFork":false,"description":"Scripts to aid in automating setup of GCP environment to support acquisition by Cado","allTopics":[],"primaryLanguage":{"name":"Shell","color":"#89e051"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-06-14T11:21:05.828Z"}},{"type":"Public","name":"masked-ai","owner":"cado-security","isFork":false,"description":"Masked Python SDK wrapper for OpenAI API. Use public LLM APIs securely.","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":2,"starsCount":102,"forksCount":10,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-03-30T13:25:13.663Z"}},{"type":"Public","name":"kape-wannacry","owner":"cado-security","isFork":false,"description":"An example collection of a system infected with WannaCry then collected with KAPE (Kroll Artifact Parser And Extractor)","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":0,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-03-27T15:52:41.464Z"}},{"type":"Public","name":"auto_ec2_lambda","owner":"cado-security","isFork":false,"description":"AWS Lambda function to continuously, automatically capture EC2 systems into Cado Platform","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-12-19T16:14:58.036Z"}},{"type":"Public","name":"cado-tines-stories","owner":"cado-security","isFork":false,"description":"Tines Stories with Cado Platform ","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-11-01T11:10:03.340Z"}},{"type":"Public","name":"docker-forensics-example-data","owner":"cado-security","isFork":false,"description":"Malicious Docker Images from https://unit42.paloaltonetworks.com/malicious-cryptojacking-images/","allTopics":[],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-11-01T10:14:44.245Z"}},{"type":"Public","name":"deprecated-free-tools","owner":"cado-security","isFork":false,"description":"Old tools for the community. No longer supported by Cado Security.","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-10-11T09:30:52.652Z"}},{"type":"Public","name":"ctf-lambda-containers","owner":"cado-security","isFork":false,"description":"","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-09-27T16:39:56.299Z"}},{"type":"Public","name":"CloudAndContainerCompromiseSimulator","owner":"cado-security","isFork":false,"description":"Simulates a compromise in a cloud and container environment","allTopics":["kubernetes","aws","cloud-security","cloud-forensics","kubernetes-security","cloudforensics","docker-forensics","kubernetes-forensics","aws-forensics","azure-forensics","container-forensics","security"],"primaryLanguage":{"name":"Shell","color":"#89e051"},"pullRequestCount":0,"issueCount":0,"starsCount":32,"forksCount":5,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-09-16T10:59:54.163Z"}},{"type":"Public","name":"Awesome-Fargate-ECS-EKS-Security-Tools-and-Guides","owner":"cado-security","isFork":false,"description":"Awesome Fargate & ECS & EKS Security Tools and Guides","allTopics":["aws-ecs","aws-eks","aws-ecs-fargate","aws-fargate-application","aws-eks-cluster","aws-ecs-capacity-provider","aws-ecs-service"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":7,"forksCount":3,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-04-13T11:38:37.559Z"}},{"type":"Public","name":"DFIR_Resources_Industroyer2","owner":"cado-security","isFork":false,"description":"IoCs and YARA rules for Industroyer2 ","allTopics":[],"primaryLanguage":{"name":"YARA","color":"#220000"},"pullRequestCount":0,"issueCount":0,"starsCount":7,"forksCount":1,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-04-12T16:05:08.966Z"}},{"type":"Public","name":"wiper_feb_2022","owner":"cado-security","isFork":false,"description":"Detects Wiper seen in Ukraine 23rd Feb 2022","allTopics":["malware","yara-rules","hermetic-wiper","isaac-wiper"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-02-25T15:57:35.562Z"}},{"type":"Public","name":"guardduty-lambda-cado","owner":"cado-security","isFork":false,"description":"Go straight from Guard Duty alerts to Automated Investigations in AWS with Cado Response","allTopics":["aws-security","soar","aws-security-automation","guardduty","aws-guardduty","aws-security-hub","aws-lambda"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":5,"forksCount":1,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-02-08T14:47:07.377Z"}},{"type":"Public","name":"rip_raw","owner":"cado-security","isFork":false,"description":"Rip Raw is a small tool to analyse the memory of compromised Linux systems.","allTopics":["forensics","dfir","forensic-analysis","memory-forensics","dfir-automation","security"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":132,"forksCount":16,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-01-31T21:25:40.800Z"}},{"type":"Public","name":"content","owner":"cado-security","isFork":true,"description":"Demisto is now Cortex XSOAR. Automate and orchestrate your Security Operations with Cortex XSOAR's ever-growing Content Repository. Pull Requests are always welcome and highly appreciated! ","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":1597,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-01-19T16:29:30.203Z"}},{"type":"Public","name":"DFIR_Resources_Whispergate","owner":"cado-security","isFork":false,"description":"Resources for DFIR Professionals Responding to the Whispergate","allTopics":["whispergate","malware","malware-analysis","malware-research"],"primaryLanguage":{"name":"C#","color":"#178600"},"pullRequestCount":0,"issueCount":0,"starsCount":9,"forksCount":1,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-01-17T12:20:42.770Z"}},{"type":"Public","name":"log4shell","owner":"cado-security","isFork":false,"description":"Content to help the community responding to the Log4j Vulnerability Log4Shell CVE-2021-44228","allTopics":["log4shell","vulnerability","cve"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":1,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-12-11T14:52:30.213Z"}},{"type":"Public","name":"Cado-Batch","owner":"cado-security","isFork":false,"description":"A Batch script to collect forensic evidence from older Windows systems","allTopics":[],"primaryLanguage":{"name":"Batchfile","color":"#C1F12E"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":1,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-09-13T09:55:46.622Z"}},{"type":"Public","name":"AWS_EKS_Cluster_Forensics","owner":"cado-security","isFork":false,"description":"AWS EKS Cluster Forensics","allTopics":["incident-response","dfir","eks","eksctl","eks-roles","cloud-forensics","eks-security","eks-fargate","aws-forensics","eks-forensics","cloud-incident-response","aws","security","amazon-web-services"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":23,"forksCount":4,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-08-16T13:44:38.620Z"}},{"type":"Public","name":"DFIR_Resources_REvil_Kaseya","owner":"cado-security","isFork":false,"description":"Resources for DFIR Professionals Responding to the REvil Ransomware Kaseya Supply Chain Attack","allTopics":["forensics","malware"],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":181,"forksCount":38,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-07-06T09:58:32.552Z"}},{"type":"Public","name":"hellokitty-ransomware","owner":"cado-security","isFork":false,"description":"Decoded HelloKitty Ransomware","allTopics":[],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":4,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-02-10T09:00:51.176Z"}},{"type":"Public","name":"MalwareAnalysis","owner":"cado-security","isFork":false,"description":"MalwareAnalysis","allTopics":[],"primaryLanguage":{"name":"C#","color":"#178600"},"pullRequestCount":0,"issueCount":0,"starsCount":12,"forksCount":3,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-12-19T11:54:53.872Z"}},{"type":"Public","name":"yara-example","owner":"cado-security","isFork":false,"description":"","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":1,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-09-03T14:49:59.653Z"}}],"repositoryCount":30,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"Repositories"}