☆104Nov 21, 2025Updated 3 months ago
Alternatives and similar repositories for auth0-customer-detections
Users that are interested in auth0-customer-detections are comparing it to the libraries listed below
Sorting:
- ☆11Jun 12, 2023Updated 2 years ago
- ☆26Mar 11, 2025Updated 11 months ago
- ☆52Dec 13, 2025Updated 2 months ago
- Automated Cloud Misconfiguration Testing☆22Jun 20, 2025Updated 8 months ago
- ☆18Jun 4, 2025Updated 9 months ago
- Tier0 (Tier Zero) Account discovery for ActiveDirectory Security☆17Apr 11, 2018Updated 7 years ago
- Purple-team telemetry & simulation toolkit.☆108Dec 16, 2025Updated 2 months ago
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events i…☆51Nov 9, 2025Updated 3 months ago
- MS Entra ID Protection Guidance☆22Apr 2, 2024Updated last year
- A Kubernetes Forensic Collection Framework for Azure Kubernetes Service☆41Feb 9, 2026Updated 3 weeks ago
- Top hashpwn rules☆20Dec 12, 2025Updated 2 months ago
- Suzaku (朱雀) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.☆168Dec 7, 2025Updated 2 months ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Jul 27, 2022Updated 3 years ago
- urlyzer is a URL parsing analysis tool.☆24Jul 27, 2024Updated last year
- Sigma detection rules for hunting with the threathunting-keywords project☆58Mar 2, 2025Updated last year
- Forensics artifacts collection☆21Jun 18, 2021Updated 4 years ago
- TypeScript/JavaScript client libraries for Sliver☆24Updated this week
- Repository that contains a set of purposefully erroneous Yara rules.☆62Jul 23, 2025Updated 7 months ago
- Scripts and tools for managing BranchCache☆27May 6, 2025Updated 10 months ago
- Elevate your Security Operations Center's efficiency with Howler, the cutting-edge alert triage platform tailored for today's SOC demands…☆44Feb 27, 2026Updated last week
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆38Aug 8, 2025Updated 6 months ago
- A public collection of detections designed to detect threats associated with the Okta WIC Platform.☆14Jan 5, 2026Updated 2 months ago
- Just a bunch of code snippets to identify and remediate common Active Directory Certificate Services issues.☆36Feb 13, 2024Updated 2 years ago
- JXA situational awareness helper by simply reading specific files on a filesystem☆82Feb 17, 2026Updated 2 weeks ago
- One Day of Python for SaintCon 2022☆11Jan 3, 2023Updated 3 years ago
- ☆76Feb 19, 2026Updated 2 weeks ago
- This repo contains a list of vendors that hide their security advisories, alerts, notices, vulnerabilities, and more behind either a payw…☆32May 11, 2024Updated last year
- A collection of my yara rules☆34Jul 11, 2023Updated 2 years ago
- Solution for Auditing LAPS usage in an Active Directory environment.☆36Dec 11, 2015Updated 10 years ago
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆37Jul 11, 2023Updated 2 years ago
- AWS Cloudformation Hook for OPA-powered infrastructure policy enforcement☆37Dec 15, 2025Updated 2 months ago
- DShield Sensor Log Collection with ELK☆45Feb 16, 2026Updated 2 weeks ago
- A tool to support the reporting of Authenticode Certificates by reducing the effort on individuals to report.☆40Feb 19, 2026Updated 2 weeks ago
- ☆37Jul 5, 2021Updated 4 years ago
- Automation tool for Windows Deception Host Burn-In☆86Dec 4, 2024Updated last year
- A module for working with Windows Event Collector service and maintain Windows Event Forwarding subscriptions.☆34Dec 14, 2025Updated 2 months ago
- Cybersecurity Incidents Mind Maps☆34Sep 29, 2021Updated 4 years ago
- AzLogDcrIngestPS - Unleashing the power of Log Ingestion API with Azure LogAnalytics custom table v2, Azure Data Collection Rules and Azu…☆33Jan 26, 2025Updated last year
- REST server that can analyze Kusto KQL queries against the Sentinel and Microsoft 365 Defender schemas.☆51Sep 22, 2025Updated 5 months ago