authomize / Open-ITDRLinks
Authomize open solutions for partners and customers
☆30Updated last year
Alternatives and similar repositories for Open-ITDR
Users that are interested in Open-ITDR are comparing it to the libraries listed below
Sorting:
- Connectors REST API Client☆16Updated last year
- Open Source Cloud Security☆727Updated 2 years ago
- OCSF Schema☆745Updated last week
- Graph-based security analysis for everyone☆352Updated last year
- Built-in Panther detection rules and policies☆428Updated this week
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.☆288Updated last year
- Open source security data lake for threat hunting, detection & response, and cybersecurity analytics at petabyte scale on AWS☆1,627Updated 10 months ago
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆192Updated last year
- A curated list of resources about detecting threats and defending Kubernetes systems.☆397Updated 2 years ago
- An open project to list all publicly known cloud vulnerabilities and CSP security issues☆368Updated 2 months ago
- A list of cloud security tools and vendors.☆180Updated last year
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆336Updated 7 months ago
- Templates for Cribl Stream Collectors☆54Updated last week
- Substation is a toolkit for routing, normalizing, and enriching security event and audit logs.☆387Updated 3 months ago
- An open-source tool for auditing your software supply chain stack for security compliance based on a new CIS Software Supply Chain benchm…☆764Updated 11 months ago
- A collection of projects supporting AWS Integration☆156Updated 2 months ago
- This repo has been replaced by https://www.cloudvulndb.org☆725Updated 3 years ago
- 🚨ATTENTION🚨 The Security Stack Mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is k…☆389Updated last year
- OCSF Documentation☆144Updated last month
- ☆189Updated last week
- Jimi is an automation first no-code platform designed and developed originally for Security Orchestration and Response. Since its launch …☆166Updated last year
- A Model Context Protocol (MCP) implementation for Splunk Enterprise and Cloud integration with Cursor IDE or Claude☆79Updated last month
- Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by devel…☆698Updated 2 weeks ago
- ☆244Updated last year
- Splunk Security Content☆1,529Updated this week
- BlueHound - pinpoint the security issues that actually matter☆754Updated 2 years ago
- Tool for building Kubernetes attack paths☆925Updated last week
- Released at Black Hat Asia on April 18, 2024, Cloud Console Cartographer is a framework for condensing groupings of cloud events (e.g. Cl…☆173Updated last year
- A standard for reducing log volume without sacrificing analytical capability☆213Updated 9 months ago
- ElectricEye is a multi-cloud, multi-SaaS Python CLI tool for Asset Management, Security Posture Management & Attack Surface Monitoring su…☆1,023Updated last week