aw-mfe / gsuite2mfeLinks
Send events from G Suite to McAfee SIEM
☆13Updated 6 years ago
Alternatives and similar repositories for gsuite2mfe
Users that are interested in gsuite2mfe are comparing it to the libraries listed below
Sorting:
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Updated 7 years ago
- Python module for evaluation of AWS account best practices around incident handling readieness.☆55Updated 5 years ago
- A Lambda-powered Security Orchestration framework for AWS GuardDuty☆53Updated 5 years ago
- Dockerfiles for containerized osquery☆14Updated 8 years ago
- This script is used to generate some basic detections of the aws security services☆71Updated 3 years ago
- A python module for orchestrating content acquisitions and analysis via amazon ssm.☆58Updated 2 years ago
- A platform to create, catalog and deploy tests for tools such as Gauntlt, AttackIQ and Metasploit.☆17Updated 9 years ago
- This command line tool counts the number of resources in different categories across Amazon regions.☆59Updated 5 years ago
- Tools for AWS forensics☆65Updated 9 years ago
- Integration for Jira ticket creation from Tenable vulnerability scans☆17Updated 6 years ago
- Scripts and integrations for OSSEC☆41Updated 9 years ago
- Automation of VPC Traffic Mirror Sessions in AWS☆35Updated 3 weeks ago
- Tenable.io SDK offers a scalable and safe way to integrate with the Tenable.io platform.☆83Updated 5 years ago
- ☆27Updated 12 years ago
- Terraform stack to deploy ELK Threat Hunting on Amazon AWS.☆89Updated 6 years ago
- Proof of Concept Zappa Based AWS Persistence and Attack Platform☆40Updated 5 years ago
- Manage Splunk Agents and Servers☆16Updated 4 months ago
- 'Continuous' AWS perimeter monitoring: Periodically scan internet facing AWS resources to detect misconfigured services.☆64Updated 6 years ago
- ☆142Updated last year
- Web based analysis platform for use with the AWS_IR command line tool.☆17Updated 9 years ago
- AWS Live Response☆12Updated 8 years ago
- A python script to shift the timestamp on syslog data. Useful for forensicators combating time skew.☆21Updated 3 years ago
- Security, Compliance and Informational Dashboard System☆25Updated 4 years ago
- Materials for the BSides NoVA/Charleston 2018 Bro Workshop☆14Updated 6 months ago
- Python scripts to download, parse, and enrich scans.io study data and load into Splunk for research, threat intelligence gathering, and s…☆19Updated this week
- Build Automated Machine Images for MISP☆29Updated 2 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆54Updated last week
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.☆111Updated 5 years ago
- Varna: Quick & Cheap AWS CloudTrail Monitoring with Event Query Language (EQL)☆52Updated 2 years ago
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆29Updated 6 years ago