Craig Ferris's repositories
network-architecture-verification-and-validation
The NAVV (Network Architecture Verification and Validation) tool creates a spreadsheet for network traffic analysis from PCAP data and Zeek logs, automating Zeek analysis of PCAP files, the collation of Zeek logs and the dissection of conn.log and dns.log to create a summary or network traffic in an XLSX-formatted spreadsheet.
aws-js-s3-explorer
AWS JavaScript S3 Explorer is a JavaScript application that uses AWS's JavaScript SDK and S3 APIs to make the contents of an S3 bucket easy to browse via a web browser.
graphics101-pipeline
A live reloading C++ shader environment for learning about the graphics pipeline
git-secrets
Prevents you from committing secrets and credentials into git repositories
aws-lambda-cpp
C++ implementation of the AWS Lambda runtime
aws-alien-attack
AWS Alien Attack is an official AWS workshop delivered by AWS SAs and AWS Partners to help customers and partners to learn about serverless architectures on AWS.
live-share
Real-time collaborative development from the comfort of your favorite tools
s3-access-for-squash
Package and access data on Amazon S3 in a squash manner
performance-dashboard-on-aws
A simple cost-effective web application to build and publish dashboards.
aws-account-vending-machine
This repository contains various versions of the account vending machine used to provision AWS accounts with custom configurations
aws-centralized-logging
The Centralized Logging on AWS solution enables organizations to collect, analyze, and display logs on AWS across multiple accounts and AWS Regions. This solution uses Amazon OpenSearch Service (successor to Amazon Elasticsearch Service) and Kibana, an analytics and visualization platform that is integrated with Amazon OpenSearch Service, that resu
packaged-vod-downloader
The Packaged VOD Downloader Workflow simplifies the process of repackaging HLS/TS Video On Demand assets to one or more output packaging formats (including HLS, DASH and CMAF).
pshtt
Scan domains and return data based on HTTPS best practices
TicTacToe
Tic Tac Toe Written in Mips
HowToGetAWSLambdaToRunBinaryFiles
How to get AWS Lambda to run binary files such as ssh
ioc-scanner
Search a filesystem for indicators of compromise (IoC).
RedEye
RedEye is a visual analytic tool supporting Red & Blue Team operations
untitledgoosetool
Untitled Goose Tool is a robust and flexible hunt and incident response tool that adds novel authentication and data gathering methods in order to run a full investigation against a customer’s Azure Active Directory (AzureAD), Azure, and M365 environments.