Threatest is a CLI and Go framework for end-to-end testing threat detection rules.
☆338May 7, 2026Updated 2 weeks ago
Alternatives and similar repositories for threatest
Users that are interested in threatest are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Granular, Actionable Adversary Emulation for the Cloud☆2,319May 13, 2026Updated last week
- Generate datasets of cloud audit logs for common attacks☆237May 7, 2026Updated 2 weeks ago
- Compares and analyzes GCP IAM roles.☆79Mar 9, 2025Updated last year
- This is a collection of threat detection rules / rules engines that I have come across.☆300May 5, 2024Updated 2 years ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Jan 12, 2024Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Playing around with Stratus Red Team (Cloud Attack simulation tool) and SumoLogic☆308Jan 6, 2023Updated 3 years ago
- pocket guide for core detection engineering concepts☆31May 8, 2023Updated 3 years ago
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆174Mar 11, 2026Updated 2 months ago
- Substation is a toolkit for routing, normalizing, and enriching security event and audit logs.☆400Jan 20, 2026Updated 4 months ago
- Open source security data lake for threat hunting, detection & response, and cybersecurity analytics at petabyte scale on AWS☆1,671Jan 8, 2025Updated last year
- Automated Attack Simulation in the Cloud, complete with detection use cases.☆612Nov 28, 2024Updated last year
- Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation o…☆1,195Apr 30, 2026Updated 3 weeks ago
- ☆170Sep 30, 2025Updated 7 months ago
- GuardDog is a CLI tool to Identify malicious PyPI and npm packages☆1,088Updated this week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A curated list of resources about detecting threats and defending Kubernetes systems.☆407Sep 2, 2023Updated 2 years ago
- BlueHound - pinpoint the security issues that actually matter☆765Jul 12, 2023Updated 2 years ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆17Jun 11, 2024Updated last year
- Tool for obfuscating and deobfuscating data.☆77Mar 20, 2024Updated 2 years ago
- ☆402Sep 25, 2023Updated 2 years ago
- Built-in Panther detection rules and policies☆452May 15, 2026Updated last week
- The TTPForge is a Cybersecurity Framework for developing, automating, and executing attacker Tactics, Techniques, and Procedures (TTPs).☆420May 13, 2026Updated last week
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆292Feb 5, 2024Updated 2 years ago
- Production-ready detection & response queries for osquery☆605Apr 22, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A repository of breaches of AWS customers☆803Mar 30, 2026Updated last month
- A Software as a Service (SaaS) log collection framework.☆186Apr 13, 2026Updated last month
- Automating situational awareness for cloud penetration tests.☆2,382Apr 21, 2026Updated last month
- All-in-one auditing toolkit for identifying common security issues in managed Kubernetes environments. Currently supports Amazon EKS.☆378May 7, 2026Updated 2 weeks ago
- ☆231Mar 27, 2026Updated last month
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆181Mar 2, 2026Updated 2 months ago
- Tool for building Kubernetes attack paths☆970May 12, 2026Updated last week
- A collection of documented and undocumented AWS API models☆55Nov 21, 2025Updated 6 months ago
- ☆194Updated this week
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Automatic detection engineering technical state compliance☆55Jul 7, 2024Updated last year
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆59Sep 7, 2023Updated 2 years ago
- List of known AWS accounts☆258Apr 2, 2026Updated last month
- simple webapp for converting sigma rules into siem queries using the pySigma library☆50Sep 1, 2023Updated 2 years ago
- ☆66May 21, 2024Updated 2 years ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆89Jan 28, 2024Updated 2 years ago
- SCP management tool☆136Oct 23, 2023Updated 2 years ago