DataDog / ghbusterLinks
A tool to identify and investigate inauthentic GitHub user accounts and repositories.
☆76Updated 2 months ago
Alternatives and similar repositories for ghbuster
Users that are interested in ghbuster are comparing it to the libraries listed below
Sorting:
- An index of publicly available and open-source threat detection rulesets.☆129Updated 6 months ago
 - A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆183Updated 8 months ago
 - Halberd : Multi-Cloud Agentic Attack Tool☆317Updated 2 months ago
 - NOVA: The Prompt Pattern Matching☆25Updated last week
 - When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆82Updated 2 months ago
 - Modern honeypot supporting multiple services, realistic website cloning, and AI-powered features☆144Updated this week
 - AuditKit - Multi-Cloud Compliance Scanner & Evidence Collection☆217Updated 2 weeks ago
 - Generate datasets of cloud audit logs for common attacks☆221Updated last year
 - ☆98Updated 3 months ago
 - CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known…☆263Updated last month
 - RequestShield is a 100% Free and OpenSource tool designed to analyze HTTP access.logs and identify suspicious HTTP requests and potential…☆105Updated 11 months ago
 - ☆75Updated 7 months ago
 - A Kubernetes Forensic Collection Framework for Azure Kubernetes Service☆37Updated 2 months ago
 - Automation tool for Windows Deception Host Burn-In☆86Updated 10 months ago
 - CRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-taki…☆251Updated last week
 - DFIR ORC PARSER PROJECT☆24Updated 2 months ago
 - cloudgrep is grep for cloud storage☆325Updated 8 months ago
 - Suzaku (朱雀) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.☆152Updated last week
 - Canary Detection☆187Updated 2 weeks ago
 - Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆311Updated 3 weeks ago
 - Customized CVE FEED Notifier☆114Updated 6 months ago
 - Static code analyser for backdoors and malicious code in git repos using OpenAI compatible LLM APIs☆73Updated last year
 - FlowAnalyzer is a tool to help in testing and analyzing OAuth 2.0 Flows, including OpenID Connect (OIDC).☆179Updated last year
 - Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆102Updated 5 months ago
 - DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆102Updated last year
 - Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆51Updated 11 months ago
 - ☆97Updated 2 weeks ago
 - Playbook-NG is a stateless web-based application used to match incident findings with countermeasures for adversary containment and evict…☆151Updated last week
 - A library of Incident Response notebooks using Jupyter. We will show how you can leverage pre-defined notebook files to guide your incide…☆150Updated last year
 - IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆106Updated last year