authomize / Open-ITDRLinks
Authomize open solutions for partners and customers
☆30Updated 11 months ago
Alternatives and similar repositories for Open-ITDR
Users that are interested in Open-ITDR are comparing it to the libraries listed below
Sorting:
- Connectors REST API Client☆16Updated last year
- Built-in Panther detection rules and policies☆396Updated this week
- Dorothy is a tool to test security monitoring and detection for Okta environments☆182Updated 10 months ago
- This repo contains example of raw event examples and possible translations to the OCSF schema.☆38Updated last month
- Apps to be used for Shuffle automation. Most of Shuffle's apps (2500+) are generated from APIs, and available in the search engine below:☆112Updated 2 weeks ago
- Released at Black Hat Asia on April 18, 2024, Cloud Console Cartographer is a framework for condensing groupings of cloud events (e.g. Cl…☆165Updated last year
- ☆126Updated last year
- The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders…☆144Updated last week
- ☆39Updated 2 years ago
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆188Updated 9 months ago
- Collection of example YARA-L rules for use within Google Security Operations☆403Updated this week
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆160Updated 2 weeks ago
- A list of cloud security tools and vendors.☆166Updated 9 months ago
- Templates for Cribl Stream Collectors☆44Updated last month
- This is a collection of threat detection rules / rules engines that I have come across.☆290Updated last year
- OSSEM Detection Model☆176Updated 2 years ago
- Sublime rules for email attack detection, prevention, and threat hunting.☆310Updated this week
- Jimi is an automation first no-code platform designed and developed originally for Security Orchestration and Response. Since its launch …☆164Updated 11 months ago
- cloudgrep is grep for cloud storage☆326Updated 3 months ago
- Demisto Content Developer Docs☆43Updated this week
- ☆15Updated 11 months ago
- Swagger/ OpenAPI specifications for security products and services☆77Updated 3 weeks ago
- OCSF Schema☆687Updated this week
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆162Updated 3 months ago
- Threat Hunting queries for various attacks☆236Updated this week
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.☆285Updated 9 months ago
- Python library to parse and convert Sigma rules into queries (and whatever else you could imagine)☆463Updated last week
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by use…☆71Updated 2 years ago
- Dettectinator - The Python library to your DeTT&CT YAML files.☆113Updated last month
- 🚨ATTENTION🚨 The Security Stack Mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is k…☆385Updated last year