Cado Security's repositories
CloudAndContainerCompromiseSimulator
Simulates a compromise in a cloud and container environment
AWS_EKS_Cluster_Forensics
AWS EKS Cluster Forensics
DFIR_Resources_Whispergate
Resources for DFIR Professionals Responding to the Whispergate
Awesome-Fargate-ECS-EKS-Security-Tools-and-Guides
Awesome Fargate & ECS & EKS Security Tools and Guides
DFIR_Resources_Industroyer2
IoCs and YARA rules for Industroyer2
guardduty-lambda-cado
Go straight from Guard Duty alerts to Automated Investigations in AWS with Cado Response
product-help
Product help and user guides
Engineering-Career-Ladder
The Engineering Career Ladder for Cado Security
cado-api-examples
Code examples for integrate with Cado API
api-reference
The documentation reference for the Cado platform's RESTful API.
Cado-Batch
A Batch script to collect forensic evidence from older Windows systems
cado-poc-eks-cluster
Easily create a simple EKS cluster for testing EKS acquisition in the Cado platform.
Deployment-Templates
Contains a copy of the Terraform deployment templates for Cado Response
kape-wannacry
An example collection of a system infected with WannaCry then collected with KAPE (Kroll Artifact Parser And Extractor)
wiper_feb_2022
Detects Wiper seen in Ukraine 23rd Feb 2022
auto_ec2_lambda
AWS Lambda function to continuously, automatically capture EC2 systems into Cado Platform
cado-tines-stories
Tines Stories with Cado Platform
deprecated-free-tools
Old tools for the community. No longer supported by Cado Security.
docker-forensics-example-data
Malicious Docker Images from https://unit42.paloaltonetworks.com/malicious-cryptojacking-images/