Curating Falco rules with MITRE ATT&CK Matrix
☆88Mar 7, 2024Updated last year
Alternatives and similar repositories for falco_extended_rules
Users that are interested in falco_extended_rules are comparing it to the libraries listed below
Sorting:
- Adaptive AWS Zero Trust Policy made easy: Auto-generate least-privilege policies based on user activity in real time! Accelerate the adop…☆76May 3, 2024Updated last year
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆89Jan 28, 2024Updated 2 years ago
- HECTOR☆20Mar 3, 2017Updated 9 years ago
- AWS Quick Start Team☆16Oct 3, 2024Updated last year
- Labs for Threat Modelling training delivered by ControlPlane☆35Feb 24, 2026Updated last week
- Security Blueprint for Startups☆39Mar 17, 2020Updated 5 years ago
- Compares and analyzes GCP IAM roles.☆78Mar 9, 2025Updated 11 months ago
- ☆22May 8, 2023Updated 2 years ago
- Command-line tool for rendering bar charts that can be displayed directly in the terminal or in text-based files like Markdown.☆19Jul 7, 2024Updated last year
- A powerful tool designed for identifying hidden endpoints and sensitive information within JavaScript files on a website.☆30Oct 19, 2023Updated 2 years ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆30Feb 16, 2025Updated last year
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆59Sep 7, 2023Updated 2 years ago
- A tool that checks if a TorchServe instance is vulnerable to CVE-2023-43654☆39Apr 21, 2024Updated last year
- 🧰 Multi Tool Kubernetes Pentest Image☆255Updated this week
- Generate a variety of suspect actions that are detected by Falco rulesets☆116Feb 12, 2026Updated 3 weeks ago
- rdsconn makes connecting to an AWS RDS instance inside a VPC from your laptop easier☆108Jul 13, 2023Updated 2 years ago
- Detect intrusions that happened in your Kubernetes cluster through audit logs using Falco☆63Jun 2, 2021Updated 4 years ago
- 💣 REST and SOAP web API fuzzer☆25May 17, 2016Updated 9 years ago
- ☆117Feb 11, 2026Updated 3 weeks ago
- MCP use case for SecOps automation w/ Splunk,CrowdStrike EDR, MISP☆21Jul 7, 2025Updated 7 months ago
- Encode binary as English text over HTTP(s)☆30Aug 25, 2023Updated 2 years ago
- Scan your account for the use of untrusted AMIs☆31Feb 13, 2026Updated 3 weeks ago
- Get started with ArgoCD and GitOps for https://dn.dev/master.☆34Jun 2, 2024Updated last year
- Demo repository showcasing how to use reusable workflows to build artifact attestations☆14Feb 16, 2026Updated 2 weeks ago
- Mitre ATT&CK and Suricata Rules Automation with AI & LLM☆14Sep 28, 2024Updated last year
- Practice typing and improve your typing speed (WPM).☆10Aug 20, 2020Updated 5 years ago
- Terraform provider for Prisma Cloud☆11Jun 24, 2020Updated 5 years ago
- ☆13Jun 12, 2024Updated last year
- ☆89Feb 11, 2022Updated 4 years ago
- A Slack bot phishing framework for Red Teaming exercises☆166Apr 27, 2024Updated last year
- This repo contains IOC, malware and malware analysis associated with Public cloud☆249Nov 11, 2024Updated last year
- All-in-one auditing toolkit for identifying common security issues in managed Kubernetes environments. Currently supports Amazon EKS.☆370Updated this week
- ☆169Sep 30, 2025Updated 5 months ago
- Kubernetes Security Training Platform - focusing on security mitigation☆978Sep 2, 2024Updated last year
- Code to Scraping some portion of Data from forum(RaidForums[seized by FBI]) with Python SCRAPY spiders bypassing recaptcha and storing to…☆10Feb 25, 2021Updated 5 years ago
- headless-ida-mcp-server☆30Apr 4, 2025Updated 11 months ago
- Files for the Kubecon EU 2025 Tutorial - Hacking up a Storm☆14Apr 4, 2025Updated 11 months ago
- Convert ABN Amro CSV bank statements to QIF☆11Jun 8, 2017Updated 8 years ago
- Bhadra is a Vulnerability Management Platform to handle all security issues☆16Updated this week