Algbra-Labs-OSS / ChronicleView external linksLinks
☆65May 21, 2024Updated last year
Alternatives and similar repositories for Chronicle
Users that are interested in Chronicle are comparing it to the libraries listed below
Sorting:
- ☆18Jul 30, 2024Updated last year
- ☆14Jun 20, 2022Updated 3 years ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Jan 12, 2024Updated 2 years ago
- ☆14Jan 8, 2026Updated last month
- Compares and analyzes GCP IAM roles.☆78Mar 9, 2025Updated 11 months ago
- Additional active scan checks for BURP☆28Oct 3, 2024Updated last year
- Take automated actions against threats and vulnerabilities.☆216Sep 14, 2023Updated 2 years ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆59Sep 7, 2023Updated 2 years ago
- Azure Activity Log Axe is a continually developing tool that simplifies the transactional log format provided by Microsoft. The tool leve…☆35Sep 6, 2024Updated last year
- Demonstrates how a malicious dependency could negatively impact the build output.☆25Aug 11, 2023Updated 2 years ago
- Collection of example YARA-L rules for use within Google Security Operations☆471Dec 5, 2025Updated 2 months ago
- Community Security Analytics provides a set of community-driven audit & threat queries for Google Cloud☆362Jun 12, 2024Updated last year
- Repository to archive GCP Documentation for local use☆16Feb 11, 2025Updated last year
- A guide to simplify the process of evaluating Datadog's Cloud SIEM security capabilities to detect AWS threats.☆19Jul 24, 2023Updated 2 years ago
- ☆51Jun 13, 2024Updated last year
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆288Feb 5, 2024Updated 2 years ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- An interactive way to learn threat modeling☆17Feb 14, 2019Updated 7 years ago
- Scan your account for the use of untrusted AMIs☆31Dec 5, 2025Updated 2 months ago
- A helper SDK to wrap the Google SecOps API for common security use cases☆62Feb 3, 2026Updated last week
- ☆83Dec 5, 2019Updated 6 years ago
- GCP CSPM using Google Sheets☆38Apr 4, 2025Updated 10 months ago
- ☆24Mar 20, 2023Updated 2 years ago
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆339Updated this week
- This repo contains IOC, malware and malware analysis associated with Public cloud☆249Nov 11, 2024Updated last year
- ☆25Jun 27, 2024Updated last year
- Repository of Volatility3 plugins☆22Mar 22, 2023Updated 2 years ago
- Collection of detection rules written in YARA-L.☆27Oct 4, 2025Updated 4 months ago
- Python library to carry out DFIR analysis on the Cloud☆499Oct 8, 2025Updated 4 months ago
- A collection of models for organizing, prioritizing, and understanding cybersecurity and information risk management concepts.☆25Oct 3, 2024Updated last year
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆59Sep 20, 2023Updated 2 years ago
- ☆12Feb 16, 2023Updated 2 years ago
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated 10 months ago
- ☆29Dec 26, 2025Updated last month
- Knowledge Report Alert & Normalization Generator☆26Updated this week
- Graph-based security analysis for everyone☆355Dec 9, 2025Updated 2 months ago
- ☆73May 13, 2025Updated 9 months ago
- Python samples and utilities for Chronicle APIs☆88Nov 7, 2025Updated 3 months ago
- ☆401Sep 25, 2023Updated 2 years ago