authomize / Open-ITDR
Authomize open solutions for partners and customers
☆28Updated 3 months ago
Related projects: ⓘ
- Connectors REST API Client☆16Updated 7 months ago
- Released at Black Hat Asia on April 18, 2024, Cloud Console Cartographer is a framework for condensing groupings of cloud events (e.g. Cl…☆147Updated 4 months ago
- An open project to list all publicly known cloud vulnerabilities and CSP security issues☆303Updated last month
- ☆16Updated 4 months ago
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆169Updated 3 weeks ago
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.☆264Updated 2 weeks ago
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by use…☆65Updated last year
- Dorothy is a tool to test security monitoring and detection for Okta environments☆169Updated last month
- A lightweight library to sanitize data provided to AI tools☆26Updated last year
- ☆163Updated 2 months ago
- https://breaches.cloud☆36Updated 2 months ago
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆85Updated 7 months ago
- ☆38Updated this week
- ☆237Updated 2 months ago
- A curated list of resources about detecting threats and defending Kubernetes systems.☆355Updated last year
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆93Updated 2 months ago
- A full insecure kubernetes application for testing security tools☆41Updated last week
- The Amazon Elastic Kubernetes Service (EKS) Creation Engine (ECE) is a Python command-line program created by the Lightspin Office of the…☆40Updated last year
- ☆66Updated 3 months ago
- Graph-based security analysis for everyone☆334Updated 8 months ago
- Audit log wall of shame.☆41Updated 2 months ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆55Updated last year
- A list of cloud security tools and vendors.☆124Updated last week
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆82Updated 8 months ago
- ☆30Updated 2 months ago
- Substation is a toolkit for routing, normalizing, and enriching security event and audit logs.☆317Updated last week
- Built-in Panther detection rules and policies☆327Updated this week
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆91Updated 3 weeks ago
- ☆10Updated this week
- This is a collection of threat detection rules / rules engines that I have come across.☆270Updated 4 months ago