SatoriCyber / universal-data-permissions-scanner
Analyze assets authorization, who has access to what and how
☆76Updated 3 months ago
Related projects: ⓘ
- ☆60Updated 6 months ago
- Automation tool for Windows Deception Host Burn-In☆71Updated 2 months ago
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CK…☆159Updated last month
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆82Updated 8 months ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆145Updated last week
- ☆234Updated 4 months ago
- Anvilogic Forge☆80Updated this week
- God Mode Detection Rules☆130Updated last month
- OCSF Schema WEB Server☆39Updated last month
- ☆31Updated 5 months ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆57Updated 3 months ago
- Cloud Offensive Breach and Risk Assessment (COBRA) Tool☆69Updated this week
- A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and contr…☆160Updated 3 weeks ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆48Updated 2 weeks ago
- Use AI to Scan Your Code from the Command Line for security and code smells. Bring your own keys. Supports OpenAI and Gemini☆143Updated 6 months ago
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆93Updated 2 months ago
- Add a layer of active defense to your cloud applications.☆77Updated this week
- Canary Detection☆159Updated 5 months ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆34Updated 2 weeks ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆125Updated 9 months ago
- OCSF Documentation☆114Updated this week
- HASH (HTTP Agnostic Software Honeypot)☆128Updated 4 months ago
- Tool for obfuscating and deobfuscating data.☆60Updated 6 months ago
- A library of Incident Response notebooks using Jupyter. We will show how you can leverage pre-defined notebook files to guide your incide…☆140Updated 10 months ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆55Updated last year
- Lambda function that streamlines containment of an AWS account compromise☆316Updated 9 months ago
- ☆77Updated last year
- A cheatsheet containing AWS CloudTrail events that can be used for Incident Response purposes or Detection Engineering.☆58Updated 4 months ago
- Cloud Commotion intends to cause chaos to simulate security incidents☆122Updated 3 months ago
- Convert a variety of log formats to CSV while enriching detected IPs with Geolocation, ASN, DNS, WhoIs, Shodan InternetDB and Threat Indi…☆91Updated 2 months ago