aws-samples / aws-scaling-threat-detection-workshop-jpView external linksLinks
A hands-on workshop to learn how to do threat detection and response in AWS.
☆11Sep 13, 2021Updated 4 years ago
Alternatives and similar repositories for aws-scaling-threat-detection-workshop-jp
Users that are interested in aws-scaling-threat-detection-workshop-jp are comparing it to the libraries listed below
Sorting:
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 5 months ago
- Threat Detection System using Hybrid (Machine Learning + Lexical Analysis) learning Approach.☆11May 30, 2017Updated 8 years ago
- Send high priority Deep Security events to the AWS Security Hub☆14Jul 31, 2019Updated 6 years ago
- ☆17Jan 22, 2026Updated 3 weeks ago
- 威胁检测规则集☆15Jul 5, 2019Updated 6 years ago
- Insider Threat Detection using Isolation Forest☆17Jun 1, 2018Updated 7 years ago
- An open source, cloud native toolkit for threat detection and mitigation☆19Mar 30, 2020Updated 5 years ago
- ☆21May 19, 2016Updated 9 years ago
- Advanced Persistent Threat Detection Using Network Analysis☆23Feb 28, 2019Updated 6 years ago
- A curated list of resources to deep dive into the intersection of applied machine learning and threat detection.☆19Sep 23, 2020Updated 5 years ago
- ☆26Oct 17, 2023Updated 2 years ago
- We, Achin and Harekrissna worked as a team to complete the project given to us on Buried threat detection using ground penetrating radar.…☆24Jan 28, 2020Updated 6 years ago
- Snort_rules detection bad actors.☆29Aug 18, 2024Updated last year
- ☆10Dec 13, 2023Updated 2 years ago
- ☆11Feb 9, 2023Updated 3 years ago
- Sample code for resizing Images with Lambda@Edge using the Custom Origin. You can deploy using AWS CDK.☆30Jun 18, 2024Updated last year
- Spatially explicit plant growth simulation☆11Jan 21, 2026Updated 3 weeks ago
- Community content for LogRhythm Axon. Includes Dashboards, searches, analytics rules, processing policies and more.☆10Jul 26, 2024Updated last year
- Detect-X Automated Threat Detection by AI☆32Oct 10, 2019Updated 6 years ago
- cfft is a testing tool for CloudFront Functions.☆37Mar 27, 2025Updated 10 months ago
- 🌌 Real-time threat detection for smart contracts☆10May 16, 2023Updated 2 years ago
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- ETHICAL-HACKING☆12Dec 20, 2023Updated 2 years ago
- Data visualizations of the spread of the 2019 novel Coronavirus (COVID-19), based on data from Johns Hopkins University.☆10May 25, 2023Updated 2 years ago
- Port of BaseFlight (with MultiWii 2.3 features) for STM32F4DISCOVERY board + GY-86 (mpu6050 + hmc5883 + ms5611) sensors board☆15Feb 3, 2014Updated 12 years ago
- For all your lunch (automation) needs!☆10May 16, 2019Updated 6 years ago
- Advanced threat detection solution for Linux.☆36Dec 5, 2020Updated 5 years ago
- It is a command line tool to register your resources in Wiki page (Markdown format).☆10Aug 28, 2021Updated 4 years ago
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- Guidance for Organization on AWS☆12Nov 26, 2025Updated 2 months ago
- A collection of React components and hooks☆14Mar 3, 2025Updated 11 months ago
- mass-contact text/SMS distribution tool☆11Apr 28, 2025Updated 9 months ago
- ☆13Nov 5, 2024Updated last year
- Event Query Router☆12Aug 9, 2019Updated 6 years ago
- Hack23 Public Information Security Management System:Security Through Transparency and Open Documentation Demonstrating Security Excellen…☆22Jan 26, 2026Updated 3 weeks ago
- Contains research.splunk.com site code☆11Apr 10, 2024Updated last year
- Interactive CD dependency diagram☆28Oct 31, 2025Updated 3 months ago
- Project that creates a Kubernetes environment in Azure (AKS) and protects it with CloudGuard CSPM / Workload and Appsec technologies☆10Jun 12, 2023Updated 2 years ago