authomize / Open-ITDRLinks
Authomize open solutions for partners and customers
☆30Updated last year
Alternatives and similar repositories for Open-ITDR
Users that are interested in Open-ITDR are comparing it to the libraries listed below
Sorting:
- Connectors REST API Client☆16Updated last year
- Open Source Cloud Security☆724Updated 2 years ago
- Open source security data lake for threat hunting, detection & response, and cybersecurity analytics at petabyte scale on AWS☆1,624Updated 10 months ago
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.☆289Updated last year
- OCSF Schema☆739Updated this week
- Graph-based security analysis for everyone☆351Updated last year
- A list of cloud security tools and vendors.☆180Updated last year
- An open project to list all publicly known cloud vulnerabilities and CSP security issues☆365Updated last month
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆191Updated last year
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆117Updated last month
- Substation is a toolkit for routing, normalizing, and enriching security event and audit logs.☆385Updated 3 months ago
- Released at Black Hat Asia on April 18, 2024, Cloud Console Cartographer is a framework for condensing groupings of cloud events (e.g. Cl…☆170Updated last year
- Scan databases and data warehouses for PII data. Tag tables and columns in data catalogs like Amundsen and Datahub☆326Updated last year
- ☆40Updated 2 years ago
- Built-in Panther detection rules and policies☆424Updated this week
- ☆16Updated 2 months ago
- Based on Lightspin proprietary data, research, and our tracking of cloud security trends in the market, our research team has compiled a …☆40Updated 3 years ago
- A compliance analysis tool which enables organizations to more quickly articulate their compliance posture and also generate supporting e…☆48Updated 3 weeks ago
- A curated list of resources about detecting threats and defending Kubernetes systems.☆397Updated 2 years ago
- Tool for building Kubernetes attack paths☆921Updated last week
- An open-source tool for auditing your software supply chain stack for security compliance based on a new CIS Software Supply Chain benchm…☆762Updated 10 months ago
- Apps to be used for Shuffle automation. Most of Shuffle's apps (2500+) are generated from APIs, and available in the search engine below:☆117Updated 3 weeks ago
- A lightweight library to sanitize data provided to AI tools☆28Updated 2 years ago
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆677Updated last month
- ☆189Updated last week
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by use…☆73Updated 2 years ago
- This repo has been replaced by https://www.cloudvulndb.org☆725Updated 3 years ago
- Curating Falco rules with MITRE ATT&CK Matrix☆84Updated last year
- Analyzing Cloud Security Posture☆56Updated last week
- A python-based API client for Cortex XDR API.☆26Updated last month