authomize / Open-ITDR
Authomize open solutions for partners and customers
☆29Updated 5 months ago
Related projects ⓘ
Alternatives and complementary repositories for Open-ITDR
- Connectors REST API Client☆16Updated 9 months ago
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.☆267Updated 2 months ago
- Released at Black Hat Asia on April 18, 2024, Cloud Console Cartographer is a framework for condensing groupings of cloud events (e.g. Cl…☆157Updated 6 months ago
- ☆39Updated last year
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆175Updated 2 months ago
- An open project to list all publicly known cloud vulnerabilities and CSP security issues☆309Updated this week
- A curated list of resources about detecting threats and defending Kubernetes systems.☆364Updated last year
- Lists of affected components and affected apps/vendors by CVE-2021-44228 (aka Log4shell or Log4j RCE). This list is meant as a resource f…☆54Updated 2 years ago
- Built-in Panther detection rules and policies☆339Updated this week
- A utility to collect data from github stargazers, subscribers and contributors of a selected project☆28Updated last year
- Easily sync open-policy rules to your feature toggles☆125Updated 4 months ago
- Dorothy is a tool to test security monitoring and detection for Okta environments☆175Updated 3 months ago
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆319Updated 11 months ago
- Lambda function that streamlines containment of an AWS account compromise☆315Updated 11 months ago
- OCSF Schema☆633Updated this week
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆86Updated 9 months ago
- ☆43Updated 3 years ago
- An open-source tool for auditing your software supply chain stack for security compliance based on a new CIS Software Supply Chain benchm…☆729Updated 4 months ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆80Updated 9 months ago
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆260Updated 9 months ago
- ☆400Updated last year
- List of known AWS accounts☆167Updated last month
- A lightweight library to sanitize data provided to AI tools☆26Updated last year
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆85Updated 10 months ago
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CK…☆161Updated last month
- ☆168Updated this week
- Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by devel…☆556Updated 2 weeks ago
- By scanning CI/CD misconfigurations, Allero helps reduce production issues, harden your security posture and shift-left CI/CD from DevOps…☆206Updated last year
- Open source security data lake for threat hunting, detection & response, and cybersecurity analytics at petabyte scale on AWS☆1,474Updated 4 months ago
- Playing around with Stratus Red Team (Cloud Attack simulation tool) and SumoLogic☆282Updated last year