☆103Nov 21, 2025Updated 5 months ago
Alternatives and similar repositories for auth0-customer-detections
Users that are interested in auth0-customer-detections are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Jun 12, 2023Updated 2 years ago
- ☆35Updated this week
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events i…☆52Apr 5, 2026Updated last month
- ☆23Apr 29, 2026Updated last week
- ☆56Dec 13, 2025Updated 4 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- Tool to check the CloudTrail configuration and the services where trails are sent, to detect potential attacks to CloudTrail logging.☆13May 25, 2024Updated last year
- Automated Cloud Misconfiguration Testing☆25Jun 20, 2025Updated 10 months ago
- Purple-team telemetry & simulation toolkit.☆113Dec 16, 2025Updated 4 months ago
- ☆26Mar 11, 2025Updated last year
- Tier0 (Tier Zero) Account discovery for ActiveDirectory Security☆17Apr 11, 2018Updated 8 years ago
- ☆18Jun 4, 2025Updated 11 months ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆17Jun 11, 2024Updated last year
- Port of Mandiant ShellcodeHashes plugin from IDA to BinaryNinja☆11Jul 24, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- MS Entra ID Protection Guidance☆22Apr 2, 2024Updated 2 years ago
- Identify QuasarRAT/AsyncRAT/DcRAT/VenomRAT servers through scanning☆13Apr 20, 2024Updated 2 years ago
- Sigma detection rules for hunting with the threathunting-keywords project☆60Mar 2, 2025Updated last year
- Top hashpwn rules☆20Dec 12, 2025Updated 4 months ago
- Create an fs.FS instance that "mounts" other fs.FS☆16Sep 29, 2022Updated 3 years ago
- Suzaku (朱雀) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.☆174Updated this week
- Example applications for http://griffon-framework.org☆12Oct 5, 2018Updated 7 years ago
- Repository that contains a set of purposefully erroneous Yara rules.☆61Jul 23, 2025Updated 9 months ago
- ☆78Feb 19, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A Kubernetes Forensic Collection Framework for Azure Kubernetes Service☆41Feb 9, 2026Updated 2 months ago
- Hunt Smarter, Hunt Harder☆192Mar 14, 2026Updated last month
- A collection of Covid-19 related threat intelligence and resources.☆19Jul 17, 2020Updated 5 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆19Oct 18, 2016Updated 9 years ago
- Assortment of scripts and tools for our Blackhat EU 2024 talk☆106Feb 6, 2025Updated last year
- Forensics artifacts collection☆21Jun 18, 2021Updated 4 years ago
- Cloak, Honey, Trap: Proactive Defenses Against LLM Agents☆22Jul 9, 2025Updated 9 months ago
- various tools for Microsoft Sentinel☆32Jun 26, 2025Updated 10 months ago
- Attaché provides an emulation layer for Cloud Provider IMDS APIs☆60Apr 23, 2026Updated last week
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A tool to identify and investigate inauthentic GitHub user accounts and repositories.☆85Apr 23, 2026Updated last week
- A Python tool to manage GitHub Organizations and perform backup☆21Mar 26, 2026Updated last month
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆51Nov 16, 2024Updated last year
- Building an Automated Perimeter Scanning System with Open Source Tools - NMAP, IVRE and Netbox☆14May 5, 2023Updated 3 years ago
- Virtual Home Lab Vol.1☆11Dec 14, 2020Updated 5 years ago
- urlyzer is a URL parsing analysis tool.☆24Jul 27, 2024Updated last year
- Python 3 library to build YARA rules.☆13Oct 24, 2021Updated 4 years ago