Graph-based security analysis for everyone
☆355Feb 19, 2026Updated last month
Alternatives and similar repositories for starbase
Users that are interested in starbase are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A library of data visualization dashboard templates that can be imported into JupiterOne.☆17Feb 19, 2026Updated last month
- A node.js client wrapper for JupiterOne public API and a CLI utility☆14Dec 9, 2025Updated 4 months ago
- Alert rules for JupiterOne security auditing☆11Feb 19, 2026Updated last month
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆54Mar 26, 2026Updated 2 weeks ago
- A Python client for jupiterone.io☆10Apr 18, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Home of the JupiterOne SDK☆19Apr 2, 2026Updated last week
- CLI for generating policies, standards and control procedures (PSP) documentation in Markdown and publishing to JupiterOne or Confluence☆87Feb 19, 2026Updated last month
- A set of policies, standards and control procedures with mapping to HIPAA, NIST CSF, PCI DSS, SOC2, FedRAMP, CIS Controls, and more.☆345Feb 19, 2026Updated last month
- Cartography is a Python tool that pulls infrastructure assets and their relationships into a Neo4j graph database.☆3,810Updated this week
- A tool to check the security settings of Github Organizations.☆75Feb 9, 2026Updated 2 months ago
- Cloudlist is a tool for listing Assets from multiple Cloud Providers.☆1,017Updated this week
- Convert cloudtrail data to MITRE ATT&CK Sightings☆82Jul 25, 2022Updated 3 years ago
- ☆18Jul 30, 2024Updated last year
- Knowledge Report Alert & Normalization Generator☆26Feb 11, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆174Mar 11, 2026Updated 3 weeks ago
- Compares and analyzes GCP IAM roles.☆79Mar 9, 2025Updated last year
- Granular, Actionable Adversary Emulation for the Cloud☆2,289Apr 2, 2026Updated last week
- Dow Jones Hammer : Protect the cloud with the power of the cloud(AWS)☆448Jul 17, 2023Updated 2 years ago
- Automated determination of which AWS services run where☆20Updated this week
- ☆230Mar 27, 2026Updated last week
- A curated list of resources about detecting threats and defending Kubernetes systems.☆407Sep 2, 2023Updated 2 years ago
- GUAC aggregates software security metadata into a high fidelity graph database.☆1,472Updated this week
- ☆65May 21, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- This application was built to help reduce the amount of time it takes to review AWS Lambda code.☆61Nov 11, 2024Updated last year
- Open source security data lake for threat hunting, detection & response, and cybersecurity analytics at petabyte scale on AWS☆1,665Jan 8, 2025Updated last year
- AWS CloudSaga - Simulate security events in AWS☆473Apr 2, 2026Updated last week
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Jan 12, 2024Updated 2 years ago
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆254Nov 18, 2024Updated last year
- This is a collection of threat detection rules / rules engines that I have come across.☆298May 5, 2024Updated last year
- Lightspin AWS IAM Vulnerability Scanner☆95Mar 28, 2021Updated 5 years ago
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆291Feb 5, 2024Updated 2 years ago
- Jimi is an automation first no-code platform designed and developed originally for Security Orchestration and Response. Since its launch …☆171Jun 19, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- GitHub Actions Pipeline Enumeration and Attack Tool☆742Mar 26, 2026Updated 2 weeks ago
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆341Apr 1, 2026Updated last week
- ☆382Apr 18, 2024Updated last year
- All-in-one auditing toolkit for identifying common security issues in managed Kubernetes environments. Currently supports Amazon EKS.☆373Apr 1, 2026Updated last week
- Production-ready detection & response queries for osquery☆603Aug 13, 2025Updated 7 months ago
- OCSF Schema☆805Mar 18, 2026Updated 3 weeks ago
- Cloudsplaining is an AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized repo…☆2,198Apr 2, 2026Updated last week