Tool for obfuscating and deobfuscating data.
☆77Mar 20, 2024Updated 2 years ago
Alternatives and similar repositories for LogLicker
Users that are interested in LogLicker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆30Jan 13, 2026Updated 3 months ago
- Released at Black Hat Asia on April 18, 2024, Cloud Console Cartographer is a framework for condensing groupings of cloud events (e.g. Cl…☆173May 16, 2024Updated last year
- cloudgrep is grep for cloud storage☆329Mar 14, 2026Updated last month
- ☆49Mar 21, 2023Updated 3 years ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Jan 12, 2024Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Exit if environment variables known to be used as access tokens are set.☆15May 30, 2022Updated 3 years ago
- CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known…☆266Nov 21, 2025Updated 5 months ago
- A GitHub Actions Supply Chain CTF / Goat☆27Apr 13, 2026Updated 2 weeks ago
- Securely store environment variables and secrets in the cloud of your choice.☆60Dec 2, 2025Updated 4 months ago
- A collection of documented and undocumented AWS API models☆54Nov 21, 2025Updated 5 months ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆74Jun 21, 2024Updated last year
- This is a collection of threat detection rules / rules engines that I have come across.☆298May 5, 2024Updated last year
- A tool for AWS incident response, that allows for enumeration, acquisition and analysis of data from AWS environments for the purpose of …☆202Jan 6, 2026Updated 3 months ago
- Azure Activity Log Axe is a continually developing tool that simplifies the transactional log format provided by Microsoft. The tool leve…☆35Sep 6, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆341Updated this week
- https://breaches.cloud☆42Oct 16, 2024Updated last year
- ☆170Sep 30, 2025Updated 7 months ago
- A small library to alter AWS API requests; Used for fuzzing research☆22Nov 2, 2023Updated 2 years ago
- Substation is a toolkit for routing, normalizing, and enriching security event and audit logs.☆397Jan 20, 2026Updated 3 months ago
- Convert cloudtrail data to MITRE ATT&CK Sightings☆82Jul 25, 2022Updated 3 years ago
- Generates runbooks for GuardDuty findings☆38Jun 24, 2024Updated last year
- A catalog of services that can be publicly exposed within different cloud providers.☆14Aug 30, 2024Updated last year
- ☆231Mar 27, 2026Updated last month
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- All-in-one auditing toolkit for identifying common security issues in managed Kubernetes environments. Currently supports Amazon EKS.☆378Updated this week
- HASH (HTTP Agnostic Software Honeypot)☆141Apr 23, 2026Updated last week
- Compares and analyzes GCP IAM roles.☆79Mar 9, 2025Updated last year
- A tool to check the security settings of Github Organizations.☆75Feb 9, 2026Updated 2 months ago
- A python package that helps with analysis of MSI files☆14Mar 28, 2021Updated 5 years ago
- Qemuno Framework☆24Sep 8, 2022Updated 3 years ago
- Used to check Github actions logs for secrets - specifically tj-actions and reviewdog☆23Mar 18, 2025Updated last year
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- PII detection platform, leveraging human-in-the-loop AI☆53Nov 29, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A cheatsheet containing AWS CloudTrail events that can be used for Incident Response purposes or Detection Engineering.☆83Jan 6, 2026Updated 3 months ago
- A curated list of resources about detecting threats and defending Kubernetes systems.☆408Sep 2, 2023Updated 2 years ago
- SCP management tool☆136Oct 23, 2023Updated 2 years ago
- Scan your account for the use of untrusted AMIs☆32Updated this week
- Block ads and malicious domains with response policy zones☆12Jun 10, 2020Updated 5 years ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆21Aug 29, 2022Updated 3 years ago
- ☆35Jan 27, 2023Updated 3 years ago