ackatz / seclook-cliLinks
Simple security lookups via CLI
☆16Updated 5 months ago
Alternatives and similar repositories for seclook-cli
Users that are interested in seclook-cli are comparing it to the libraries listed below
Sorting:
- Automatic security lookups from your clipboard☆24Updated last year
- A simple touchID prompt'er for use in shell scripts.☆98Updated last year
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆51Updated 7 months ago
- Security Alert Decoration☆27Updated 2 months ago
- A cybersecurity tool designed to safeguard against IDN Homograph Attacks☆37Updated 7 months ago
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆104Updated last year
- ☆48Updated 8 months ago
- A collection of models for organizing, prioritizing, and understanding cybersecurity and information risk management concepts.☆22Updated 8 months ago
- ☆30Updated last week
- AWS honey token manager☆87Updated 10 months ago
- ☆25Updated 3 months ago
- ☆132Updated last month
- Aftermath is a free macOS incident response framework☆32Updated 2 months ago
- Rules shared by the community from 100 Days of YARA 2025☆33Updated 5 months ago
- This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector finding…☆47Updated 5 months ago
- HashiCorp-relevant rules for the Semgrep code analysis tool☆41Updated last year
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆77Updated 2 weeks ago
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events i…☆44Updated last month
- Knowledge Report Alert & Normalization Generator☆27Updated last year
- Generates runbooks for GuardDuty findings☆36Updated last year
- ☆29Updated 8 months ago
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆77Updated last week
- ☆22Updated 3 months ago
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆40Updated last month
- An index of publicly available and open-source threat detection rulesets.☆114Updated 2 months ago
- The Jolly Executioner - a simple command execution proxy☆16Updated last year
- Semgrep-based Policy Controller for Kubernetes☆47Updated 2 months ago
- The first AI agent for Okta! A secure, local-first AI agent that helps Okta administrators query their tenant data using natural language…☆20Updated last week
- Static code analyser for backdoors and malicious code in git repos using OpenAI compatible LLM APIs☆73Updated last year
- ☆18Updated 3 years ago