☆10Mar 31, 2021Updated 4 years ago
Alternatives and similar repositories for AWS-Security-Hub-Data-Connector
Users that are interested in AWS-Security-Hub-Data-Connector are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This site has a lot of security breaches to exploit. Do not install on production environments!☆12Aug 9, 2024Updated last year
- ☆14Sep 26, 2023Updated 2 years ago
- ☆20Nov 10, 2021Updated 4 years ago
- ☆21Jul 6, 2025Updated 8 months ago
- IOT Investigation☆10Aug 13, 2021Updated 4 years ago
- A note exporter for the macOS Apple Notes database, which generates Standard Notes format.☆16Nov 4, 2017Updated 8 years ago
- SharePoint Online with ADFS Authentication (Windows 8 Store App)☆14Feb 7, 2013Updated 13 years ago
- ☆10Jul 1, 2023Updated 2 years ago
- Using the Yelp Fusion API to find local businesses without an online presence☆12Jun 2, 2021Updated 4 years ago
- A tool to encrypt and decrypt environment variables using KMS☆17Apr 18, 2023Updated 2 years ago
- Aletheia Project Core☆19Mar 2, 2026Updated 3 weeks ago
- A deep learning-powered visual navigation engine to enables autonomous navigation of pocket-size quadrotor - running on PULP☆13Oct 30, 2024Updated last year
- Automate Redshift cluster creation with best practices using AWS CloudFormation☆12Mar 3, 2022Updated 4 years ago
- Deploy Django application in AWS App Runner☆10Jul 19, 2021Updated 4 years ago
- ☆38Dec 5, 2023Updated 2 years ago
- Documentation, samples and VSCode plugin for the Serverless COBOL for AWS solution from BluAge☆20Mar 12, 2021Updated 5 years ago
- ☆15Oct 20, 2024Updated last year
- ☆11Jun 13, 2019Updated 6 years ago
- Python library to enable you to run custom AWS Config Rules at scale, using Lambda Layer.☆98Mar 12, 2026Updated last week
- Showcase for implementing passwordless authentication or connecting Cognito to external user database☆12Jul 17, 2019Updated 6 years ago
- a small demo repo to show how I got neuralbeagle14-7b running locally on my 8GB GPU☆14Jan 29, 2024Updated 2 years ago
- ☆10Apr 14, 2018Updated 7 years ago
- Cloud Native Training, Certification and Resources☆11Mar 12, 2019Updated 7 years ago
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆35Sep 18, 2023Updated 2 years ago
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- Draw book mind maps to see the relationship between characters easily :)☆13Nov 29, 2024Updated last year
- We want to create a dashboard (with knowledge graphs) to visualize the network node communication situation based on the firewall logs to…☆16Oct 26, 2024Updated last year
- Rapid RNA-seq pipeline using AWS lambda functions for alignment☆13Mar 22, 2019Updated 7 years ago
- Sample code demonstrating Prometheus metrics ingestion into Amazon CloudWatch☆17Mar 4, 2022Updated 4 years ago
- Augmentation to Machine Readable CTI☆37Sep 9, 2025Updated 6 months ago
- ☆13Mar 9, 2023Updated 3 years ago
- The Microsoft Student Security Operations Center (SOC) Toolkit is designed to equip facilitators with everything needed to prepare high s…☆21Jul 1, 2025Updated 8 months ago
- Multi Cloud Antivirus Scanning API using YARA and CLAMAV for AWS S3, Azure Blob Storage and GCP Cloud Storage☆22Sep 1, 2024Updated last year
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆38May 28, 2025Updated 9 months ago
- ☆15Jul 30, 2019Updated 6 years ago
- Kenna Security API and Scripting Toolkit☆34Feb 20, 2026Updated last month
- ☆17Oct 15, 2020Updated 5 years ago
- My Jupyter Notebooks☆36Mar 14, 2025Updated last year
- The System Wide Information Service (SWIM) Federal NOTAM System (FNS) Java Messaging Service (JMS) Reference Implementation (FnsClient) p…☆23Mar 28, 2024Updated last year