DataDog / ghbusterLinks
A tool to identify and investigate inauthentic GitHub user accounts and repositories.
☆74Updated last month
Alternatives and similar repositories for ghbuster
Users that are interested in ghbuster are comparing it to the libraries listed below
Sorting:
- An index of publicly available and open-source threat detection rulesets.☆125Updated 5 months ago
- Halberd : Multi-Cloud Agentic Attack Tool☆312Updated last month
- CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known…☆263Updated last month
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆180Updated 8 months ago
- Customized CVE FEED Notifier☆114Updated 5 months ago
- Generate datasets of cloud audit logs for common attacks☆220Updated last year
- ☆191Updated 5 months ago
- AuditKit - Multi-Cloud Compliance Scanner & Evidence Collection☆170Updated this week
- Static code analyser for backdoors and malicious code in git repos using OpenAI compatible LLM APIs☆73Updated last year
- Supply-Chain Firewall (SCFW) is a tool for preventing the installation of malicious npm and PyPI packages☆165Updated this week
- RequestShield is a 100% Free and OpenSource tool designed to analyze HTTP access.logs and identify suspicious HTTP requests and potential…☆104Updated 10 months ago
- cloudgrep is grep for cloud storage☆325Updated 7 months ago
- CRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-taki…☆250Updated last week
- Modern honeypot supporting multiple services, realistic website cloning, and AI-powered features☆143Updated last month
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆79Updated last month
- ☆75Updated 6 months ago
- HASH (HTTP Agnostic Software Honeypot)☆138Updated last year
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆309Updated this week
- A security tool that detects malicious packages from external vulnerability feeds and searches for them in your package registries or art…☆57Updated last week
- Canary Detection☆187Updated 4 months ago
- FlowAnalyzer is a tool to help in testing and analyzing OAuth 2.0 Flows, including OpenID Connect (OIDC).☆179Updated last year
- Automation tool for Windows Deception Host Burn-In☆86Updated 10 months ago
- Web Server Vulnerability Scanning Tool☆36Updated 7 months ago
- Gram is Klarna's own threat model diagramming tool☆325Updated last week
- ☆97Updated 2 months ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆142Updated 9 months ago
- ☆72Updated last month
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆51Updated 10 months ago
- ☆163Updated last week
- Use AI to Scan Your Code from the Command Line for security and code smells. Bring your own keys. Supports OpenAI and Gemini☆174Updated 5 months ago