Graph-based security analysis for everyone
☆356Feb 19, 2026Updated 2 months ago
Alternatives and similar repositories for starbase
Users that are interested in starbase are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A library of data visualization dashboard templates that can be imported into JupiterOne.☆17Feb 19, 2026Updated 2 months ago
- A node.js client wrapper for JupiterOne public API and a CLI utility☆14Dec 9, 2025Updated 4 months ago
- Alert rules for JupiterOne security auditing☆11Feb 19, 2026Updated 2 months ago
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆54Mar 26, 2026Updated last month
- A Python client for jupiterone.io☆10Apr 18, 2024Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Home of the JupiterOne SDK☆19Apr 9, 2026Updated 2 weeks ago
- CLI for generating policies, standards and control procedures (PSP) documentation in Markdown and publishing to JupiterOne or Confluence☆87Feb 19, 2026Updated 2 months ago
- A set of policies, standards and control procedures with mapping to HIPAA, NIST CSF, PCI DSS, SOC2, FedRAMP, CIS Controls, and more.☆345Feb 19, 2026Updated 2 months ago
- Cartography is a Python tool that pulls infrastructure assets and their relationships into a Neo4j graph database.☆3,840Updated this week
- A tool to check the security settings of Github Organizations.☆75Feb 9, 2026Updated 2 months ago
- Cloudlist is a tool for listing Assets from multiple Cloud Providers.☆1,019Apr 20, 2026Updated last week
- Convert cloudtrail data to MITRE ATT&CK Sightings☆82Jul 25, 2022Updated 3 years ago
- ☆18Jul 30, 2024Updated last year
- Knowledge Report Alert & Normalization Generator☆26Updated this week
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆175Mar 11, 2026Updated last month
- Compares and analyzes GCP IAM roles.☆79Mar 9, 2025Updated last year
- Dow Jones Hammer : Protect the cloud with the power of the cloud(AWS)☆449Jul 17, 2023Updated 2 years ago
- Granular, Actionable Adversary Emulation for the Cloud☆2,301Updated this week
- Automated determination of which AWS services run where☆20Apr 18, 2026Updated last week
- ☆231Mar 27, 2026Updated last month
- A curated list of resources about detecting threats and defending Kubernetes systems.☆408Sep 2, 2023Updated 2 years ago
- 🤖 Ivan: AI-Powered Development Assistant - Breaks down complex tasks, implements them with Claude Code, creates PRs with smart commits, …☆39Updated this week
- GUAC aggregates software security metadata into a high fidelity graph database.☆1,481Updated this week
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆65May 21, 2024Updated last year
- This application was built to help reduce the amount of time it takes to review AWS Lambda code.☆61Nov 11, 2024Updated last year
- Open source security data lake for threat hunting, detection & response, and cybersecurity analytics at petabyte scale on AWS☆1,671Jan 8, 2025Updated last year
- AWS CloudSaga - Simulate security events in AWS☆473Updated this week
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Jan 12, 2024Updated 2 years ago
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆254Nov 18, 2024Updated last year
- This is a collection of threat detection rules / rules engines that I have come across.☆298May 5, 2024Updated last year
- Lightspin AWS IAM Vulnerability Scanner☆95Mar 28, 2021Updated 5 years ago
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆291Feb 5, 2024Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Jimi is an automation first no-code platform designed and developed originally for Security Orchestration and Response. Since its launch …☆171Jun 19, 2024Updated last year
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆341Updated this week
- ☆383Apr 15, 2026Updated 2 weeks ago
- All-in-one auditing toolkit for identifying common security issues in managed Kubernetes environments. Currently supports Amazon EKS.☆378Updated this week
- Production-ready detection & response queries for osquery☆603Apr 22, 2026Updated last week
- OCSF Schema☆819Updated this week
- Cloudsplaining is an AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized repo…☆2,203Apr 21, 2026Updated last week