☆10Mar 31, 2021Updated 4 years ago
Alternatives and similar repositories for AWS-Security-Hub-Data-Connector
Users that are interested in AWS-Security-Hub-Data-Connector are comparing it to the libraries listed below
Sorting:
- Augmentation to Machine Readable CTI☆37Sep 9, 2025Updated 5 months ago
- My Jupyter Notebooks☆36Mar 14, 2025Updated 11 months ago
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆35Sep 18, 2023Updated 2 years ago
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆38May 28, 2025Updated 9 months ago
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- An HTTP proxy library for Go☆17Jun 22, 2022Updated 3 years ago
- SharePoint Online with ADFS Authentication (Windows 8 Store App)☆14Feb 7, 2013Updated 13 years ago
- Microsoft-Defender-for-IoT☆14May 26, 2025Updated 9 months ago
- ☆21Jul 6, 2025Updated 7 months ago
- It's a handy tool to help you analyze malware. You can use this tool to query your malware samples using different hashes or find all oth…☆20Jul 22, 2025Updated 7 months ago
- ☆10Jul 1, 2023Updated 2 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- ☆11Feb 22, 2022Updated 4 years ago
- Plugin that serves the ATT&CK website alongside CALDERA.☆12Feb 24, 2020Updated 6 years ago
- A collection of Python resources for Blue Team security work☆16Sep 23, 2018Updated 7 years ago
- Deploy Django application in AWS App Runner☆10Jul 19, 2021Updated 4 years ago
- ☆11Jun 13, 2019Updated 6 years ago
- This site has a lot of security breaches to exploit. Do not install on production environments!☆12Aug 9, 2024Updated last year
- Using the Yelp Fusion API to find local businesses without an online presence☆12Jun 2, 2021Updated 4 years ago
- Is a portable forensic tool for analyzing Windows logs, pre-organized according to the methodology outlined in this job: https://cybersec…☆15Jul 19, 2025Updated 7 months ago
- Draw book mind maps to see the relationship between characters easily :)☆13Nov 29, 2024Updated last year
- Quick lookup files for SUNBURST Backdoor☆12Dec 15, 2020Updated 5 years ago
- Automate Redshift cluster creation with best practices using AWS CloudFormation☆12Mar 3, 2022Updated 4 years ago
- All my POC related to malware development☆15Feb 19, 2026Updated last week
- IOT Investigation☆10Aug 13, 2021Updated 4 years ago
- Get started using Synapse Open-Source to start a Cortex and perform analysis within your area of expertise.☆50May 16, 2022Updated 3 years ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆53Oct 23, 2024Updated last year
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆57Feb 19, 2026Updated last week
- Threat Analytics Search Chrome Extension☆12Updated this week
- This content supports the Plan deployment for updating Windows VMs in the Azure Architecture Center.☆51Aug 8, 2025Updated 6 months ago
- ☆13Feb 18, 2024Updated 2 years ago
- Splunk app for visualization of DMARC RUA mails☆15Sep 26, 2025Updated 5 months ago
- ☆20Nov 10, 2021Updated 4 years ago
- ☆11May 13, 2024Updated last year
- cryptam document malware analysis tool☆12Jun 18, 2023Updated 2 years ago
- A tool to encrypt and decrypt environment variables using KMS☆17Apr 18, 2023Updated 2 years ago
- A tool to automate memory dump processing using Volatility, including optional Splunk integration.☆12Jul 29, 2020Updated 5 years ago
- Showcase for implementing passwordless authentication or connecting Cognito to external user database☆12Jul 17, 2019Updated 6 years ago
- Public Chronicle Detection Rules☆12Apr 25, 2023Updated 2 years ago