A hands-on workshop to learn how to do threat detection and response in AWS.
☆17Jun 6, 2022Updated 3 years ago
Alternatives and similar repositories for aws-scaling-threat-detection-workshop
Users that are interested in aws-scaling-threat-detection-workshop are comparing it to the libraries listed below
Sorting:
- This repository provides a Terraform implementation that deploys an Amazon EKS cluster in a private VPC and deploys Windows and Linux wor…☆10Feb 23, 2022Updated 4 years ago
- Google Cloud Platform (GCP) CLI and utils☆14May 6, 2023Updated 2 years ago
- ☆11Mar 2, 2026Updated last week
- Ansible playbook to convert Sigma rules to ElastAlert rules☆10Feb 5, 2021Updated 5 years ago
- simple service mesh example (3x microservices) with LINKERD☆22Jan 9, 2020Updated 6 years ago
- Enable Falco to read audit logs from EKS☆11Dec 13, 2020Updated 5 years ago
- Declarative patterns to write kubernetes controllers☆10Feb 17, 2021Updated 5 years ago
- Slack alert bot for matching Github Audit Events☆10Nov 12, 2024Updated last year
- A collection of Python snippets for the Zed IDE to improve your development speed and productivity.☆21Dec 1, 2025Updated 3 months ago
- ☆16Aug 25, 2025Updated 6 months ago
- ☆13Apr 6, 2023Updated 2 years ago
- Kubernetes admission controller that validate image in deployment is vulnerability free☆11May 6, 2020Updated 5 years ago
- Automated Real-Time Threat Hunting with ATD, Active Response and Elasticsearch/Kibana☆10Aug 17, 2018Updated 7 years ago
- Sample code for blue/green and canary deployments on Amazon EKS using AWS App Mesh/Istio and Argo Rollouts☆10May 12, 2023Updated 2 years ago
- The proposed solution shows and approach to unify and centralize logs across different compute platforms like EC2, ECS, EKS and Lambda wi…☆14Oct 17, 2023Updated 2 years ago
- ☆13Jan 16, 2021Updated 5 years ago
- This repository provides sample code that uses programmatic way for applying aws-auth ConfigMap in Amazon EKS (Programmatic Amazon EKS Cl…☆13Mar 15, 2021Updated 4 years ago
- A Hugo module for the Simple Icons icon set.☆11Feb 25, 2026Updated last week
- This solution uses AWS CDK to simplify the deployment and testing of EKS clusters with customized amazon machine images.☆11Oct 17, 2023Updated 2 years ago
- Cloud Agnostic IaC based SaaS Skeleton☆11Mar 3, 2026Updated last week
- Block abused TLDs in Tenant Allow BlockList☆15Jan 21, 2026Updated last month
- Github Action to achieve the perfect balance for your projects☆14Apr 24, 2023Updated 2 years ago
- Ansible role for multiuser SSH 2FA using Duo☆11May 2, 2019Updated 6 years ago
- Leveraging it is a simple matter of presenting the server with the SSH2_MSG_USERAUTH_SUCCESS message, which shows that the login already…☆14Oct 17, 2018Updated 7 years ago
- Demo application using GitOps best practices with Flux☆13Nov 29, 2021Updated 4 years ago
- A Cloud Native Buildpack that provides the Azul Zulu implementations of JREs and JDKs☆14Updated this week
- Unpack / repack scripts for Mstar firmware bundles/binaries (e.g. MstarUpgrade.bin)☆11May 25, 2016Updated 9 years ago
- The article provides a push-button solution to protect your infrastructure against incoming traffic from embargoed countries as defined b…☆15Jun 1, 2019Updated 6 years ago
- A Kubectl plugin to manage Pod Security Policy(PSP) and the related RBAC Resources.☆13Apr 27, 2021Updated 4 years ago
- A Python, Boto3 script that leverages a forensic volume to attach & mount to a selected instance, run a memory dump, unmount and detach f…☆12Jul 15, 2020Updated 5 years ago
- ☆18Dec 6, 2022Updated 3 years ago
- A CLI tool to simulate EC2 Spot Instances interruptions using AWS Fault Injection Simulator.☆12May 4, 2022Updated 3 years ago
- Step by step tutorial for those who have zero knowledge to Amazon EKS☆14Jan 31, 2026Updated last month
- Terraform module that creates RBAC rules for Kubernetes☆16Sep 27, 2023Updated 2 years ago
- Demonstrates sending AWS SecurityHub findings to your email☆14Dec 14, 2018Updated 7 years ago
- Terraform module to provision EKS Managed Node Group☆13Jun 4, 2021Updated 4 years ago
- Cloud threat detection visualization from excalidraw☆12Apr 25, 2022Updated 3 years ago
- Code to deploy a complete Amazon Managed Blockchain solution that can write and read documents to Hyperledger Fabric via API Gateway and …☆14Jan 29, 2025Updated last year
- CVE-2024-30056 Microsoft Edge (Chromium-based) Information Disclosure Vulnerability☆17May 27, 2024Updated last year