airbnb / binaryalert
BinaryAlert: Serverless, Real-time & Retroactive Malware Detection.
☆1,416Updated last year
Alternatives and similar repositories for binaryalert:
Users that are interested in binaryalert are comparing it to the libraries listed below
- (DEPRECATED) Diffy is a triage tool used during cloud-centric security incidents, to help digital forensics and incident response (DFIR)…☆633Updated last year
- StreamAlert is a serverless, realtime data analysis framework which empowers you to ingest, analyze, and alert on data from any environme…☆2,863Updated last year
- honeyλ - a simple, serverless application designed to create and monitor fake HTTP endpoints (i.e. URL honeytokens) automatically, on top…☆513Updated 6 years ago
- Distributed alerting for the masses!☆996Updated 6 years ago
- Dow Jones Hammer : Protect the cloud with the power of the cloud(AWS)☆437Updated last year
- Security auditing tool for AWS environments☆1,730Updated 6 years ago
- DEPRECATED - MozDef: Mozilla Enterprise Defense Platform☆2,166Updated 3 years ago
- Python installable command line utiltity for mitigation of host and key compromises.☆344Updated 3 years ago
- AWS Least Privilege for Distributed, High-Velocity Deployment☆1,127Updated last year
- An information security preparedness tool to do adversarial simulation.☆1,106Updated 5 years ago
- Real-time, container-based file scanning at enterprise scale☆893Updated last month
- Fast Incident Response☆1,766Updated last week
- an osquery fleet manager☆619Updated 2 years ago
- A Linux Auditd rule set mapped to MITRE's Attack Framework☆777Updated 4 years ago
- VirusTotal Wanna Be - Now with 100% more Hipster☆1,659Updated last year
- VSAQ is an interactive questionnaire application to assess the security programs of third parties.☆849Updated 4 years ago
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,405Updated 4 months ago
- A repository for using osquery for incident detection and response☆834Updated 2 years ago
- Collection of scripts and resources for DevSecOps and Automated Incident Response Security☆621Updated 4 years ago
- Create actionable data from your Vulnerability Scans☆1,362Updated 2 years ago
- A centralized source of all AWS IAM privilege escalation methods released by Rhino Security Labs.☆903Updated 5 years ago
- A tool to help forensicate offline docker acquisitions☆533Updated 3 months ago
- Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.☆1,280Updated 2 years ago
- Incident Response Forensic Framework☆600Updated 5 years ago
- A collection of AWS penetration testing junk☆1,181Updated last year
- Security Monkey monitors AWS, GCP, OpenStack, and GitHub orgs for assets and their changes over time.☆4,352Updated 3 years ago
- CloudTracker helps you find over-privileged IAM users and roles by comparing CloudTrail logs with current IAM policies.☆891Updated 3 years ago
- A graph-based tool for visualizing effective access and resource relationships in AWS environments.☆927Updated 2 years ago