☆33Apr 10, 2026Updated 3 weeks ago
Alternatives and similar repositories for cloud-siem-content-catalog
Users that are interested in cloud-siem-content-catalog are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Aug 8, 2022Updated 3 years ago
- P.S.E.U.D.O. optimizes the macOS Platform SSO registration experience.☆48Apr 28, 2026Updated last week
- This repository maintains some of the scripts made by Ebryx DevSecOps team.☆12Dec 21, 2022Updated 3 years ago
- An index of publicly available and open-source threat detection rulesets.☆134Apr 17, 2025Updated last year
- Tool to enumerate unregistered reply URLs for single and multitenant apps in Azure☆15Jan 23, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Quick & Dirty DFIR scripts developed by Ebryx DFIR team to keep handy during field assignment☆14Jan 7, 2026Updated 3 months ago
- List of custom developed KQL queries to help proactive security teams hunt for opportunistic and sophisticated threat activity by develop…☆26Jun 30, 2021Updated 4 years ago
- Old home of LimaCharlie, open source EDR☆32Sep 4, 2023Updated 2 years ago
- Python implementation of select MicroBurst scripts.☆17Aug 19, 2021Updated 4 years ago
- Use SQL to instantly query GCP resources across regions, projects and organizations. Open source CLI. No DB required.☆46Apr 12, 2026Updated 3 weeks ago
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- A CALDERA plugin☆28Apr 27, 2026Updated last week
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- Community content for LogRhythm Axon. Includes Dashboards, searches, analytics rules, processing policies and more.☆10Jul 26, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆42Sep 5, 2025Updated 8 months ago
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- Active Response plugin. Osquery to execute wazuh/ossec active response plugins. You can write your own plugins, easy to plug☆12Jun 20, 2020Updated 5 years ago
- Threat Network Detection in Online Social Networks☆12Jan 20, 2017Updated 9 years ago
- HACKING BOT is an automated bug bounty tool that streamlines security testing by running multiple cybersecurity tools in parallel. It all…☆20Mar 6, 2025Updated last year
- Kafka library with a schema registry integration☆10Dec 16, 2025Updated 4 months ago
- Automated Real-Time Threat Hunting with ATD, Active Response and Elasticsearch/Kibana☆10Aug 17, 2018Updated 7 years ago
- ☆12May 2, 2022Updated 4 years ago
- Projects for AWS ThreatHunting☆21Aug 20, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A suite of Volatility 3 plugins for memory forensics of Docker containers☆18Jan 10, 2024Updated 2 years ago
- ☆13Feb 6, 2018Updated 8 years ago
- Primary data pipelines for intrusion detection, security analytics and threat hunting☆85Jan 9, 2022Updated 4 years ago
- Minimal AWSCLI & AWS-CDK & NodeJS/NPM built on top of Alpine Linux Docker Image☆12Feb 15, 2024Updated 2 years ago
- Build your own threat hunting maturity model☆11Oct 29, 2017Updated 8 years ago
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆21Sep 6, 2022Updated 3 years ago
- fatt tries to find any purl in your project by looking at predefined fields in the supported packages. These fields describe using a purl…☆11Apr 14, 2026Updated 3 weeks ago
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.☆26Nov 2, 2025Updated 6 months ago
- SIEM USE Case Selection Methodology☆17Sep 18, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆13Jun 26, 2022Updated 3 years ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆18Feb 9, 2024Updated 2 years ago
- K8s Network Policy Migrator is a tool to migrate Calico or Cilium custom network policies to Kubernetes native network policy. The tool o…☆32Aug 29, 2023Updated 2 years ago
- ☆14Mar 6, 2023Updated 3 years ago
- ☆14Aug 21, 2022Updated 3 years ago
- A list of cyber security companies or companies that have their own Cyber Security Department.☆21Jun 10, 2024Updated last year
- Proof of concept incident response demo using SSM and AWS Fargate.☆14Dec 5, 2019Updated 6 years ago