chainguard-dev / osqtoolLinks
Automated testing, generation & manipulation of #osquery packs
☆72Updated 7 months ago
Alternatives and similar repositories for osqtool
Users that are interested in osqtool are comparing it to the libraries listed below
Sorting:
- Compares and analyzes GCP IAM roles.☆77Updated 2 months ago
- Audit log wall of shame.☆41Updated 7 months ago
- ☆112Updated this week
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆31Updated 7 months ago
- ☆44Updated 2 months ago
- Adversary emulation for EDR/SIEM testing (macOS/Linux)☆43Updated last year
- Knowledge Report Alert & Normalization Generator☆27Updated last year
- Osquery Mangement Server☆114Updated 4 years ago
- Security Alert Decoration☆27Updated last month
- GCP CSPM using Google Sheets☆36Updated last month
- K8s API Honeypot with Active Defense Capabilities☆40Updated last year
- Attaché provides an emulation layer for Cloud Provider IMDS APIs☆55Updated 11 months ago
- A Software as a Service (SaaS) log collection framework.☆170Updated this week
- pocket guide for core detection engineering concepts☆28Updated 2 years ago
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by use…☆70Updated 2 years ago
- Osquery Resources☆60Updated 5 years ago
- ☆65Updated last year
- vexctl is a tool to attest VEX impact statements☆44Updated 2 years ago
- Markdown Version of the DHS/CISA Secure Software Development Self Attestation Form.☆21Updated 2 years ago
- ☆54Updated 2 weeks ago
- Cisco Orbital - Osquery queries by Talos☆131Updated 9 months ago
- Convert cloudtrail data to MITRE ATT&CK Sightings☆80Updated 2 years ago
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆162Updated 2 months ago
- Dorothy is a tool to test security monitoring and detection for Okta environments☆182Updated 9 months ago
- Manage, monitor and improve your cyber security posture.☆90Updated 2 years ago
- ☆16Updated last year
- ☆14Updated 2 years ago
- ☆29Updated 6 months ago
- ☆113Updated last week
- ☆67Updated 2 weeks ago