DIAL(Did I Alert Lambda?) is a centralised security misconfiguration detection framework which completely runs on AWS Managed services like AWS API Gateway, AWS Event Bridge & AWS Lambda
☆94Sep 22, 2022Updated 3 years ago
Alternatives and similar repositories for DIAL
Users that are interested in DIAL are comparing it to the libraries listed below
Sorting:
- An advanced real time threat intelligence framework to identify threats and malicious web traffic on the basis of IP reputation and histo…☆249Dec 8, 2022Updated 3 years ago
- ☆55Apr 25, 2023Updated 2 years ago
- My set of notes and resources for Microsoft and other exams☆15Oct 20, 2021Updated 4 years ago
- Terraform your Grafana Dashboards☆15Nov 3, 2022Updated 3 years ago
- Awesome resources for managing AWS cost.☆14Jan 10, 2024Updated 2 years ago
- ☆18Oct 15, 2024Updated last year
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Jul 15, 2022Updated 3 years ago
- (kinda) Malicious Outlook Reader☆19Mar 2, 2021Updated 5 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆29Jun 27, 2022Updated 3 years ago
- An introduction to global assessment techniques using Python☆12Apr 24, 2023Updated 2 years ago
- ☆19Dec 12, 2023Updated 2 years ago
- Streamlit dashboard to visualize acitivity on git repositories☆23Dec 10, 2021Updated 4 years ago
- Automatic generation of YARA rules from sample files.☆28Apr 10, 2025Updated 10 months ago
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Apr 1, 2023Updated 2 years ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Jan 12, 2024Updated 2 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Jan 18, 2022Updated 4 years ago
- ☆142Feb 25, 2026Updated last week
- ☆19Updated this week
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆34Jul 24, 2025Updated 7 months ago
- shouganaiyo-loader is a cross-platform Frida-based Node.js command-line tool that forces Java processes to load a Java/JVMTI agent regard…☆39Dec 30, 2021Updated 4 years ago
- Azure AD enumeration over MS Graph☆81Nov 30, 2022Updated 3 years ago
- An example of COM hijacking using a proxy DLL.☆44Aug 17, 2021Updated 4 years ago
- Sample/PoC Windows kernel driver for detect DMA devices by using Vendor ID and Device ID signatures☆38Sep 22, 2024Updated last year
- ☆80Apr 18, 2023Updated 2 years ago
- BBSSRF - Bug Bounty SSRF is a powerful tool to check SSRF OOB connection☆38Apr 3, 2023Updated 2 years ago
- This script tampers the apk to inject Facebook Stetho library to inspect app sandbox data on non-rooted device☆41Oct 19, 2020Updated 5 years ago
- Portfolio website.☆10Nov 29, 2023Updated 2 years ago
- Neural Network Execution Service☆11Oct 3, 2023Updated 2 years ago
- Returns a stream of English words☆22Apr 30, 2024Updated last year
- Code repository for CISO agent as part of ITBench☆21May 8, 2025Updated 9 months ago
- CloudGraph managed policy packs☆10May 17, 2023Updated 2 years ago
- Public Benefits Studio's Document Extractor to automate document data extraction with AI and OCR.☆13Jun 2, 2025Updated 9 months ago
- Open Cloud Security Posture Management Engine☆344Feb 19, 2022Updated 4 years ago
- ☆15Aug 23, 2025Updated 6 months ago
- ☆11May 2, 2020Updated 5 years ago
- ☆19Updated this week
- ☆19Nov 19, 2025Updated 3 months ago
- Demo App☆11Jan 27, 2026Updated last month
- python scripts for interacting with aws☆10Jan 21, 2022Updated 4 years ago