BenjiTrapp / aws-threat-huntingView external linksLinks
Short deep dive into Threat Hunting on AWS
☆17Oct 15, 2023Updated 2 years ago
Alternatives and similar repositories for aws-threat-hunting
Users that are interested in aws-threat-hunting are comparing it to the libraries listed below
Sorting:
- Offensive Terraform module which copies publicly exposed EBS snapshot to us-east-1 region in attacker's AWS account and creates EBS volum…☆14Sep 18, 2020Updated 5 years ago
- A catalog of services that can be publicly exposed within different cloud providers.☆14Aug 30, 2024Updated last year
- Extract CIS benchmarks from PDFs☆16Jul 26, 2023Updated 2 years ago
- Easily create Splunk searches from Python and get the result as a Python object.☆14May 30, 2024Updated last year
- Cybersecurity Architects Handbook, published by Packt☆27Mar 27, 2024Updated last year
- ☆25Mar 30, 2022Updated 3 years ago
- ☆43Aug 27, 2025Updated 5 months ago
- ☆11Feb 9, 2023Updated 3 years ago
- The Enhanced MITRE ATT&CK® Coverage Tracker is an Excel tool for SOCs to measure and improve detection coverage of cyber threats. It simp…☆34Nov 13, 2025Updated 3 months ago
- ☆34Aug 23, 2022Updated 3 years ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆60Mar 12, 2022Updated 3 years ago
- ☆31Feb 10, 2023Updated 3 years ago
- 🌌 Real-time threat detection for smart contracts☆10May 16, 2023Updated 2 years ago
- A library and command line tool for extracting indicators of compromise (IOCs) from security reports in PDF, HTML, Word, or text format☆48Dec 22, 2025Updated last month
- Card Payments Simulation Tool For Indie Devs : Core Card Switch Engine, Fraud Engine, ATM/POS GUI Simulator , Admin Dash (Real-time MSG …☆19Jun 15, 2025Updated 8 months ago
- ETHICAL-HACKING☆12Dec 20, 2023Updated 2 years ago
- Github action for linting AWS IAM policy documents☆38Jan 20, 2023Updated 3 years ago
- A repo of fake committed secrets to test tools that find committed secrets ([dont submit for BB :-) ]☆10Mar 22, 2018Updated 7 years ago
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- A Docker-based development stack for Bedrock WordPress multisite, optimized for local development, source control, and CI/CD integration.☆13Jun 26, 2025Updated 7 months ago
- Lists of Dynamic DNS Domains/FQDNs as well as lists of services/providers that offer free dynamic dns domains.☆12Nov 2, 2021Updated 4 years ago
- ☆36Nov 9, 2025Updated 3 months ago
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 7 years ago
- A very basic app written in Javascript and packaged as a Docker image to be used as a demo when testing clustered deployments in ECS/EKS.☆11Jun 30, 2023Updated 2 years ago
- Sigma Queries turned into KQL for Defender using pysigma☆12Jun 20, 2024Updated last year
- An SSH honeypot written entirely in Go.☆12Dec 4, 2025Updated 2 months ago
- Contains research.splunk.com site code☆11Apr 10, 2024Updated last year
- Event Query Router☆12Aug 9, 2019Updated 6 years ago
- Code Repository for Linux Troubleshooting Course with Real Life Examples, published by Packt☆12Jul 8, 2025Updated 7 months ago
- A penetration testing tool to help in Infrastructure pentesting process.☆11Sep 19, 2023Updated 2 years ago
- Alternative password shadowing scheme☆10Dec 1, 2025Updated 2 months ago
- ll In One Tool For Info Gathering, SQL Vulnerability Scannig and Crawling☆13Jun 10, 2017Updated 8 years ago
- This JavaScript CLI "undeletes' packages that have been removed from the NPM registry☆29Dec 18, 2025Updated last month
- a fast changelog generator sourced from PRs and Issues☆60Feb 10, 2026Updated last week
- This module helps you get started with basic Zigbee analysis, and later on performing additional attacks on the Zigbee protocol.☆12Nov 23, 2016Updated 9 years ago
- Agent PR Replay takes merged PRs from any repository, reverse-engineers the task prompt, runs Claude Code against it, and compares what t…☆26Jan 1, 2026Updated last month
- Tools for Quickly Formatting and Partitioning USB Flash Drives☆11Apr 13, 2016Updated 9 years ago