0xdefendA / defenda-data-lakeLinks
defendA Data Lake. A firehose pipeline to athena providing enrichment and normalization for security events
☆16Updated 2 years ago
Alternatives and similar repositories for defenda-data-lake
Users that are interested in defenda-data-lake are comparing it to the libraries listed below
Sorting:
- ☆18Updated 4 years ago
- Serverless honeytoken 🕵🏻♂️☆80Updated 2 years ago
- AWS EKS Cluster Forensics☆23Updated 4 years ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 3 years ago
- pocket guide for core detection engineering concepts☆30Updated 2 years ago
- ☆65Updated last year
- Cisco Orbital - Osquery queries by Talos☆134Updated last year
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.☆29Updated 2 years ago
- Updated incident response generator for training classes☆44Updated 4 years ago
- Recon Hunt Queries☆78Updated 4 years ago
- A MITRE ATT&CK Navigator export for AWS GuardDuty Findings☆138Updated 4 years ago
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆38Updated 2 years ago
- ☆47Updated 6 months ago
- A Lambda-powered Security Orchestration framework for AWS GuardDuty☆53Updated 5 years ago
- Knowledge Report Alert & Normalization Generator☆27Updated last year
- Sharing Threat Hunting runbooks☆26Updated 6 years ago
- misp-cloud - Cloud-ready images of MISP☆73Updated 3 years ago
- Import specific data sources into the Sigma generic and open signature format.☆78Updated 3 years ago
- A collection of notebooks built for defensive and offensive operations.☆77Updated 4 years ago
- ☆119Updated last year
- ☆34Updated 4 years ago
- Web based analysis platform for use with the AWS_IR command line tool.☆17Updated 9 years ago
- Things to know when DFIR occurs near a vault deployment.☆43Updated 7 years ago
- pollen - A command-line tool for interacting with TheHive☆35Updated 6 years ago
- ☆32Updated 7 years ago
- ☆30Updated 2 months ago
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Updated 3 years ago
- Attack Range to test detection against nativel serverless cloud services and environments☆35Updated 4 years ago
- Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .☆65Updated last year
- Remotely collect linux live forensics artifacts.☆14Updated 3 years ago