brexhq / substationView external linksLinks
Substation is a toolkit for routing, normalizing, and enriching security event and audit logs.
☆389Jan 20, 2026Updated 3 weeks ago
Alternatives and similar repositories for substation
Users that are interested in substation are comparing it to the libraries listed below
Sorting:
- Open source security data lake for threat hunting, detection & response, and cybersecurity analytics at petabyte scale on AWS☆1,656Jan 8, 2025Updated last year
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆339Updated this week
- Tool for obfuscating and deobfuscating data.☆75Mar 20, 2024Updated last year
- A Software as a Service (SaaS) log collection framework.☆182Jan 16, 2026Updated 3 weeks ago
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆288Feb 5, 2024Updated 2 years ago
- pocket guide for core detection engineering concepts☆31May 8, 2023Updated 2 years ago
- Audit log wall of shame.☆42Aug 20, 2025Updated 5 months ago
- A standard for reducing log volume without sacrificing analytical capability☆214Feb 21, 2025Updated 11 months ago
- Granular, Actionable Adversary Emulation for the Cloud☆2,252Feb 6, 2026Updated last week
- Crowdsourced list of sensitive IAM Actions☆159Oct 29, 2024Updated last year
- A tool to check the security settings of Github Organizations.☆75Updated this week
- SCP management tool☆135Oct 23, 2023Updated 2 years ago
- ☆51Dec 13, 2025Updated 2 months ago
- Data perimeter helper is a tool that helps you design and anticipate the impact of your data perimeter controls☆17Jan 21, 2026Updated 3 weeks ago
- ☆65May 21, 2024Updated last year
- OCSF Schema☆775Updated this week
- Convert cloudtrail data to MITRE ATT&CK Sightings☆82Jul 25, 2022Updated 3 years ago
- An index of publicly available and open-source threat detection rulesets.☆131Apr 17, 2025Updated 9 months ago
- Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation o…☆1,126Dec 19, 2025Updated last month
- ☆30Jan 13, 2026Updated last month
- AWS SSO Reporter☆55May 7, 2025Updated 9 months ago
- Production-ready detection & response queries for osquery☆600Aug 13, 2025Updated 6 months ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Jan 12, 2024Updated 2 years ago
- Tenzir is the data pipeline engine for security teams.☆719Updated this week
- IAM-Deescalate helps mitigate privilege escalation risk in AWS identity and access management (IAM)☆98Sep 14, 2022Updated 3 years ago
- A framework for developing alerting and detection strategies for incident response.☆837Sep 8, 2025Updated 5 months ago
- Living Off the Orchard: macOS Binaries (LOOBins) is designed to provide detailed information on various built-in "living off the land" ma…☆519Dec 19, 2025Updated last month
- Graph-based security analysis for everyone☆355Dec 9, 2025Updated 2 months ago
- This is a collection of threat detection rules / rules engines that I have come across.☆296May 5, 2024Updated last year
- cloudgrep is grep for cloud storage☆326Feb 26, 2025Updated 11 months ago
- An open-source command-line tool for cybersecurity reporting automation and a configuration language for reusable templates. Reporting-as…☆67Jul 6, 2025Updated 7 months ago
- Built-in Panther detection rules and policies☆439Updated this week
- Collect IAM information from all your AWS organization, accounts, and resources.☆85Feb 7, 2026Updated last week
- Generate datasets of cloud audit logs for common attacks☆232Updated this week
- A curated list of resources about detecting threats and defending Kubernetes systems.☆404Sep 2, 2023Updated 2 years ago
- Automated testing, generation & manipulation of #osquery packs☆74Oct 16, 2024Updated last year
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- IAMbic is Version-Control for IAM. It centralizes and simplifies cloud access and permissions. It maintains an eventually consistent, hum…☆297Nov 27, 2024Updated last year
- A pure Go library for working with Structured Threat Information Expression (STIX™) version 2.x data☆27Apr 27, 2025Updated 9 months ago