Graph-based security analysis for everyone
☆357Feb 19, 2026Updated last month
Alternatives and similar repositories for starbase
Users that are interested in starbase are comparing it to the libraries listed below
Sorting:
- A library of data visualization dashboard templates that can be imported into JupiterOne.☆18Feb 19, 2026Updated last month
- A node.js client wrapper for JupiterOne public API and a CLI utility☆14Dec 9, 2025Updated 3 months ago
- Alert rules for JupiterOne security auditing☆11Feb 19, 2026Updated last month
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆55Dec 9, 2025Updated 3 months ago
- A Python client for jupiterone.io☆10Apr 18, 2024Updated last year
- Home of the JupiterOne SDK☆19Mar 4, 2026Updated 2 weeks ago
- CLI for generating policies, standards and control procedures (PSP) documentation in Markdown and publishing to JupiterOne or Confluence☆87Feb 19, 2026Updated last month
- A set of policies, standards and control procedures with mapping to HIPAA, NIST CSF, PCI DSS, SOC2, FedRAMP, CIS Controls, and more.☆345Feb 19, 2026Updated last month
- Cartography is a Python tool that consolidates infrastructure assets and the relationships between them in an intuitive graph view powere…☆3,760Updated this week
- A tool to check the security settings of Github Organizations.☆75Feb 9, 2026Updated last month
- Cloudlist is a tool for listing Assets from multiple Cloud Providers.☆1,011Mar 11, 2026Updated last week
- Convert cloudtrail data to MITRE ATT&CK Sightings☆82Jul 25, 2022Updated 3 years ago
- ☆18Jul 30, 2024Updated last year
- Knowledge Report Alert & Normalization Generator☆26Feb 11, 2026Updated last month
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆174Mar 11, 2026Updated last week
- Compares and analyzes GCP IAM roles.☆78Mar 9, 2025Updated last year
- Granular, Actionable Adversary Emulation for the Cloud☆2,277Mar 12, 2026Updated last week
- Dow Jones Hammer : Protect the cloud with the power of the cloud(AWS)☆448Jul 17, 2023Updated 2 years ago
- Automated determination of which AWS services run where☆20Updated this week
- ☆229Mar 10, 2026Updated last week
- A curated list of resources about detecting threats and defending Kubernetes systems.☆407Sep 2, 2023Updated 2 years ago
- GUAC aggregates software security metadata into a high fidelity graph database.☆1,454Updated this week
- ☆65May 21, 2024Updated last year
- This application was built to help reduce the amount of time it takes to review AWS Lambda code.☆61Nov 11, 2024Updated last year
- Open source security data lake for threat hunting, detection & response, and cybersecurity analytics at petabyte scale on AWS☆1,659Jan 8, 2025Updated last year
- AWS CloudSaga - Simulate security events in AWS☆474Updated this week
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Jan 12, 2024Updated 2 years ago
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆254Nov 18, 2024Updated last year
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆290Feb 5, 2024Updated 2 years ago
- This is a collection of threat detection rules / rules engines that I have come across.☆297May 5, 2024Updated last year
- Lightspin AWS IAM Vulnerability Scanner☆94Mar 28, 2021Updated 4 years ago
- Jimi is an automation first no-code platform designed and developed originally for Security Orchestration and Response. Since its launch …☆170Jun 19, 2024Updated last year
- GitHub Actions Pipeline Enumeration and Attack Tool☆736Mar 5, 2026Updated 2 weeks ago
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆339Updated this week
- ☆382Apr 18, 2024Updated last year
- All-in-one auditing toolkit for identifying common security issues in managed Kubernetes environments. Currently supports Amazon EKS.☆370Updated this week
- Production-ready detection & response queries for osquery☆601Aug 13, 2025Updated 7 months ago
- OCSF Schema☆797Updated this week
- Cloudsplaining is an AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized repo…☆2,195Mar 4, 2026Updated 2 weeks ago