Graph-based security analysis for everyone
☆356Feb 19, 2026Updated last week
Alternatives and similar repositories for starbase
Users that are interested in starbase are comparing it to the libraries listed below
Sorting:
- A library of data visualization dashboard templates that can be imported into JupiterOne.☆18Feb 19, 2026Updated last week
- A node.js client wrapper for JupiterOne public API and a CLI utility☆15Dec 9, 2025Updated 2 months ago
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆55Dec 9, 2025Updated 2 months ago
- Alert rules for JupiterOne security auditing☆12Feb 19, 2026Updated last week
- Home of the JupiterOne SDK☆20Updated this week
- Cloudlist is a tool for listing Assets from multiple Cloud Providers.☆1,005Feb 16, 2026Updated last week
- CLI for generating policies, standards and control procedures (PSP) documentation in Markdown and publishing to JupiterOne or Confluence☆88Feb 19, 2026Updated last week
- A tool to check the security settings of Github Organizations.☆75Feb 9, 2026Updated 2 weeks ago
- ☆229Updated this week
- ☆65May 21, 2024Updated last year
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆174Updated this week
- A set of policies, standards and control procedures with mapping to HIPAA, NIST CSF, PCI DSS, SOC2, FedRAMP, CIS Controls, and more.☆342Feb 19, 2026Updated last week
- Cartography is a Python tool that consolidates infrastructure assets and the relationships between them in an intuitive graph view powere…☆3,729Updated this week
- ☆18Jul 30, 2024Updated last year
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Jan 12, 2024Updated 2 years ago
- Granular, Actionable Adversary Emulation for the Cloud☆2,266Feb 13, 2026Updated 2 weeks ago
- A curated list of resources about detecting threats and defending Kubernetes systems.☆402Sep 2, 2023Updated 2 years ago
- Convert cloudtrail data to MITRE ATT&CK Sightings☆82Jul 25, 2022Updated 3 years ago
- This application was built to help reduce the amount of time it takes to review AWS Lambda code.☆61Nov 11, 2024Updated last year
- Knowledge Report Alert & Normalization Generator☆26Feb 11, 2026Updated 2 weeks ago
- Compares and analyzes GCP IAM roles.☆78Mar 9, 2025Updated 11 months ago
- Automated determination of which AWS services run where☆20Feb 21, 2026Updated last week
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆253Nov 18, 2024Updated last year
- Open source security data lake for threat hunting, detection & response, and cybersecurity analytics at petabyte scale on AWS☆1,658Jan 8, 2025Updated last year
- This is a collection of threat detection rules / rules engines that I have come across.☆296May 5, 2024Updated last year
- Lightspin AWS IAM Vulnerability Scanner☆94Mar 28, 2021Updated 4 years ago
- GUAC aggregates software security metadata into a high fidelity graph database.☆1,450Updated this week
- ☆14Jan 8, 2026Updated last month
- AWS CloudSaga - Simulate security events in AWS☆473Updated this week
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆225Sep 4, 2024Updated last year
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆107Jan 30, 2025Updated last year
- Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by devel…☆719Nov 14, 2025Updated 3 months ago
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆46Feb 2, 2026Updated 3 weeks ago
- The SOCless automation framework☆140Feb 11, 2025Updated last year
- Tool for obfuscating and deobfuscating data.☆75Mar 20, 2024Updated last year
- Substation is a toolkit for routing, normalizing, and enriching security event and audit logs.☆389Jan 20, 2026Updated last month
- Firepit - STIX Columnar Storage☆18Jun 5, 2024Updated last year
- Jumpstart multiple WebSocket servers quickly☆32Nov 23, 2021Updated 4 years ago
- Scripts to import OSCAL example content into the Neo4J graph database☆32Jan 28, 2023Updated 3 years ago