Substation is a toolkit for routing, normalizing, and enriching security event and audit logs.
☆393Jan 20, 2026Updated 2 months ago
Alternatives and similar repositories for substation
Users that are interested in substation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆339Mar 17, 2026Updated last week
- pocket guide for core detection engineering concepts☆31May 8, 2023Updated 2 years ago
- Open source security data lake for threat hunting, detection & response, and cybersecurity analytics at petabyte scale on AWS☆1,662Jan 8, 2025Updated last year
- A Software as a Service (SaaS) log collection framework.☆185Mar 16, 2026Updated last week
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆291Feb 5, 2024Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Audit log wall of shame.☆42Aug 20, 2025Updated 7 months ago
- Tool for obfuscating and deobfuscating data.☆77Mar 20, 2024Updated 2 years ago
- An index of publicly available and open-source threat detection rulesets.☆130Apr 17, 2025Updated 11 months ago
- A standard for reducing log volume without sacrificing analytical capability☆214Feb 21, 2025Updated last year
- Data perimeter helper is a tool that helps you design and anticipate the impact of your data perimeter controls☆17Jan 21, 2026Updated 2 months ago
- Granular, Actionable Adversary Emulation for the Cloud☆2,283Mar 12, 2026Updated 2 weeks ago
- Crowdsourced list of sensitive IAM Actions☆159Oct 29, 2024Updated last year
- SCP management tool☆135Oct 23, 2023Updated 2 years ago
- ☆56Dec 13, 2025Updated 3 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Convert cloudtrail data to MITRE ATT&CK Sightings☆82Jul 25, 2022Updated 3 years ago
- Production-ready detection & response queries for osquery☆602Aug 13, 2025Updated 7 months ago
- OCSF Schema☆801Mar 18, 2026Updated last week
- A tool to check the security settings of Github Organizations.☆75Feb 9, 2026Updated last month
- A framework for developing alerting and detection strategies for incident response.☆852Sep 8, 2025Updated 6 months ago
- ☆65May 21, 2024Updated last year
- Generate datasets of cloud audit logs for common attacks☆235Mar 17, 2026Updated last week
- A tool that allows you to document and assess any security automation in your SOC☆49Oct 31, 2024Updated last year
- A pure Go library for working with Structured Threat Information Expression (STIX™) version 2.x data☆27Apr 27, 2025Updated 10 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆30Jan 13, 2026Updated 2 months ago
- A curated list of resources about detecting threats and defending Kubernetes systems.☆407Sep 2, 2023Updated 2 years ago
- pocket guide for core threat hunting concepts☆23May 6, 2020Updated 5 years ago
- Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation o…☆1,155Dec 19, 2025Updated 3 months ago
- This is a collection of threat detection rules / rules engines that I have come across.☆297May 5, 2024Updated last year
- IAM-Deescalate helps mitigate privilege escalation risk in AWS identity and access management (IAM)☆98Sep 14, 2022Updated 3 years ago
- Built-in Panther detection rules and policies☆441Updated this week
- An open-source command-line tool for cybersecurity reporting automation and a configuration language for reusable templates. Reporting-as…☆67Jul 6, 2025Updated 8 months ago
- Real-time, container-based file scanning at enterprise scale☆979Mar 19, 2026Updated last week
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Tenzir is the data pipeline engine for security teams.☆730Updated this week
- List of known AWS accounts☆257Feb 6, 2026Updated last month
- Living Off the Orchard: macOS Binaries (LOOBins) is designed to provide detailed information on various built-in "living off the land" ma…☆528Feb 25, 2026Updated last month
- The TTPForge is a Cybersecurity Framework for developing, automating, and executing attacker Tactics, Techniques, and Procedures (TTPs).☆415Mar 20, 2026Updated last week
- Generates runbooks for GuardDuty findings☆38Jun 24, 2024Updated last year
- Sublime rules for email attack detection, prevention, and threat hunting.☆352Mar 20, 2026Updated last week
- Scripts to quickly fix security and compliance issues☆28Mar 10, 2026Updated 2 weeks ago