Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.
☆55Dec 9, 2025Updated 2 months ago
Alternatives and similar repositories for secops-automation-examples
Users that are interested in secops-automation-examples are comparing it to the libraries listed below
Sorting:
- A library of data visualization dashboard templates that can be imported into JupiterOne.☆18Feb 19, 2026Updated last week
- CLI for generating policies, standards and control procedures (PSP) documentation in Markdown and publishing to JupiterOne or Confluence☆88Feb 19, 2026Updated last week
- A set of policies, standards and control procedures with mapping to HIPAA, NIST CSF, PCI DSS, SOC2, FedRAMP, CIS Controls, and more.☆342Feb 19, 2026Updated last week
- Graph-based security analysis for everyone☆357Feb 19, 2026Updated last week
- Spotter is a comprehensive Kubernetes security scanner that uses CEL-based rules to identify security vulnerabilities, misconfigurations,…☆71Sep 13, 2025Updated 5 months ago
- Posture Attribute Collection and Evaluation☆23Jun 20, 2023Updated 2 years ago
- A set of tools that allow researchers to experiment with certificate chain validation issues☆13Dec 4, 2019Updated 6 years ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14May 28, 2025Updated 9 months ago
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- Simplified go-cat agent for caldera☆11Dec 18, 2023Updated 2 years ago
- The command-line client for Journal☆12Oct 26, 2024Updated last year
- Presentations, training modules, and other education materials from Duo Security's Application Security team.☆76Jul 15, 2021Updated 4 years ago
- Package to extend Airflow functionality with CWL v1.0 support☆12Jun 12, 2019Updated 6 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆29Aug 18, 2019Updated 6 years ago
- Pattern recognition for hosts, services, and content☆14Aug 19, 2022Updated 3 years ago
- 📖 A repo of configuration examples for StackHawk's Hawkscan!☆18Jan 28, 2026Updated last month
- ☆28Aug 6, 2020Updated 5 years ago
- ☆14Nov 13, 2023Updated 2 years ago
- OpenCSPM Community Controls☆14May 18, 2021Updated 4 years ago
- A tool for studying JavaScript malware.☆15Updated this week
- A capture-the-flag exercise based on data analysis challenges☆19Jan 30, 2020Updated 6 years ago
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆16Jul 16, 2025Updated 7 months ago
- AWS Backup implementation in terraform☆13Feb 8, 2020Updated 6 years ago
- This is a custom SSM agent which is sorta functional☆17Jul 5, 2021Updated 4 years ago
- ☆14Apr 23, 2019Updated 6 years ago
- OSCAL SSP content for technologies shipped by Red Hat☆16Mar 2, 2023Updated 3 years ago
- A tool for analyzing the attack surface of an application☆19Mar 5, 2025Updated 11 months ago
- Detection scripts for MDM deployment to identify OpenClaw installations on managed devices.☆63Feb 5, 2026Updated 3 weeks ago
- ☆18Jun 8, 2018Updated 7 years ago
- ☆15Feb 1, 2019Updated 7 years ago
- ☆14Jun 28, 2017Updated 8 years ago
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Jun 15, 2021Updated 4 years ago
- ☆34Apr 29, 2021Updated 4 years ago
- Repository with supporting materials for Invictus Academy/Training☆44Jan 3, 2025Updated last year
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆46Feb 2, 2026Updated 3 weeks ago
- An interactive way to learn threat modeling☆17Feb 14, 2019Updated 7 years ago
- REST API client to consume w3af☆17May 22, 2023Updated 2 years ago
- A meta-database collecting resources that compile lists of breaches☆21Oct 30, 2025Updated 4 months ago