Tool for obfuscating and deobfuscating data.
☆77Mar 20, 2024Updated 2 years ago
Alternatives and similar repositories for LogLicker
Users that are interested in LogLicker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆30Jan 13, 2026Updated 2 months ago
- Released at Black Hat Asia on April 18, 2024, Cloud Console Cartographer is a framework for condensing groupings of cloud events (e.g. Cl…☆173May 16, 2024Updated last year
- cloudgrep is grep for cloud storage☆327Mar 14, 2026Updated 3 weeks ago
- ☆49Mar 21, 2023Updated 3 years ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Jan 12, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Exit if environment variables known to be used as access tokens are set.☆15May 30, 2022Updated 3 years ago
- CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known…☆266Nov 21, 2025Updated 4 months ago
- A GitHub Actions Supply Chain CTF / Goat☆27Jan 6, 2026Updated 3 months ago
- Securely store environment variables and secrets in the cloud of your choice.☆60Dec 2, 2025Updated 4 months ago
- A collection of documented and undocumented AWS API models☆53Nov 21, 2025Updated 4 months ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆74Jun 21, 2024Updated last year
- This is a collection of threat detection rules / rules engines that I have come across.☆298May 5, 2024Updated last year
- A tool for AWS incident response, that allows for enumeration, acquisition and analysis of data from AWS environments for the purpose of …☆200Jan 6, 2026Updated 3 months ago
- Azure Activity Log Axe is a continually developing tool that simplifies the transactional log format provided by Microsoft. The tool leve…☆35Sep 6, 2024Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆341Updated this week
- ☆170Sep 30, 2025Updated 6 months ago
- A small library to alter AWS API requests; Used for fuzzing research☆22Nov 2, 2023Updated 2 years ago
- Substation is a toolkit for routing, normalizing, and enriching security event and audit logs.☆395Jan 20, 2026Updated 2 months ago
- Convert cloudtrail data to MITRE ATT&CK Sightings☆82Jul 25, 2022Updated 3 years ago
- Generates runbooks for GuardDuty findings☆38Jun 24, 2024Updated last year
- A catalog of services that can be publicly exposed within different cloud providers.☆14Aug 30, 2024Updated last year
- ☆230Mar 27, 2026Updated 2 weeks ago
- All-in-one auditing toolkit for identifying common security issues in managed Kubernetes environments. Currently supports Amazon EKS.☆373Apr 1, 2026Updated last week
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- HASH (HTTP Agnostic Software Honeypot)☆141Apr 1, 2026Updated last week
- Compares and analyzes GCP IAM roles.☆79Mar 9, 2025Updated last year
- A tool to check the security settings of Github Organizations.☆75Feb 9, 2026Updated 2 months ago
- Qemuno Framework☆24Sep 8, 2022Updated 3 years ago
- Used to check Github actions logs for secrets - specifically tj-actions and reviewdog☆22Mar 18, 2025Updated last year
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- PII detection platform, leveraging human-in-the-loop AI☆53Nov 29, 2024Updated last year
- A cheatsheet containing AWS CloudTrail events that can be used for Incident Response purposes or Detection Engineering.☆82Jan 6, 2026Updated 3 months ago
- A curated list of resources about detecting threats and defending Kubernetes systems.☆407Sep 2, 2023Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- SCP management tool☆136Oct 23, 2023Updated 2 years ago
- Scan your account for the use of untrusted AMIs☆32Updated this week
- Block ads and malicious domains with response policy zones☆12Jun 10, 2020Updated 5 years ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆21Aug 29, 2022Updated 3 years ago
- ☆35Jan 27, 2023Updated 3 years ago
- This tool analyzes a given Gitlab repository and searches for dangling or force-pushed commits containing potential secret or interesting…☆47Aug 16, 2024Updated last year
- Python 3 library to build YARA rules.☆13Oct 24, 2021Updated 4 years ago