authomize / Open-ITDR
Authomize open solutions for partners and customers
☆29Updated 8 months ago
Alternatives and similar repositories for Open-ITDR:
Users that are interested in Open-ITDR are comparing it to the libraries listed below
- Connectors REST API Client☆16Updated last year
- ☆39Updated last year
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.☆273Updated 5 months ago
- Lists of affected components and affected apps/vendors by CVE-2021-44228 (aka Log4shell or Log4j RCE). This list is meant as a resource f…☆54Updated 3 years ago
- ☆16Updated 9 months ago
- Released at Black Hat Asia on April 18, 2024, Cloud Console Cartographer is a framework for condensing groupings of cloud events (e.g. Cl…☆161Updated 9 months ago
- Dorothy is a tool to test security monitoring and detection for Okta environments☆178Updated 6 months ago
- Easily sync open-policy rules to your feature toggles☆127Updated 7 months ago
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆140Updated this week
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆106Updated 4 months ago
- A Software as a Service (SaaS) log collection framework.☆148Updated this week
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆91Updated last year
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by use…☆67Updated 2 years ago
- This is a collection of threat detection rules / rules engines that I have come across.☆281Updated 9 months ago
- A tool for AWS incident response, that allows for enumeration, acquisition and analysis of data from AWS environments for the purpose of …☆185Updated 4 months ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆59Updated last year
- The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders…☆142Updated 5 months ago
- ☆14Updated 7 months ago
- Generate datasets of cloud audit logs for common attacks☆199Updated 6 months ago
- Substation is a toolkit for routing, normalizing, and enriching security event and audit logs.☆340Updated 3 weeks ago
- Anvilogic Forge☆93Updated this week
- cloudgrep is grep for cloud storage☆324Updated 2 weeks ago
- An open-source tool for auditing your software supply chain stack for security compliance based on a new CIS Software Supply Chain benchm…☆735Updated 2 months ago
- A full insecure kubernetes application for testing security tools☆66Updated this week
- GitGuardian Canary Tokens☆133Updated last year
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆326Updated last year
- Built-in Panther detection rules and policies☆359Updated this week
- An open project to list all publicly known cloud vulnerabilities and CSP security issues☆319Updated this week
- A cheatsheet containing AWS CloudTrail events that can be used for Incident Response purposes or Detection Engineering.☆67Updated 9 months ago
- https://breaches.cloud☆38Updated 4 months ago