cookpad / aws-falcon-data-forwarderLinks
CrowdStrike Falcon log forwarder from falcon S3 bucket to your S3 bucket
☆11Updated 4 years ago
Alternatives and similar repositories for aws-falcon-data-forwarder
Users that are interested in aws-falcon-data-forwarder are comparing it to the libraries listed below
Sorting:
- Falcon Data Replicator☆33Updated 5 months ago
- Osquery Mangement Server☆114Updated 5 years ago
- Start enforcing G Suite third-party apps via OAuth☆58Updated 7 years ago
- Remote Memory Acquisition Tool☆251Updated 5 years ago
- ☆187Updated this week
- ☆76Updated 3 weeks ago
- ☆65Updated last year
- Pokes users about outstanding security risks found by Crowdstrike Spotlight or vmware Workspace ONE so they secure their own endpoint.☆29Updated 3 weeks ago
- ☆48Updated last week
- Unleash the power of the Falcon Platform at the CLI☆124Updated last week
- Simple Docker-based quickstart for osquery, Fleet, and ELK stack☆63Updated 2 years ago
- Scripts from my book OS X Incident Response Scripting and Analysis -> https://www.amazon.com/dp/012804456X/ref=cm_sw_r_tw_dp_U_x_fQeLAb68…☆50Updated 9 years ago
- A MITRE ATT&CK Navigator export for AWS GuardDuty Findings☆138Updated 4 years ago
- ☆44Updated last month
- Automated testing, generation & manipulation of #osquery packs☆73Updated 11 months ago
- A Terraform module for GRR: the distributed incident forensics and response framework☆51Updated 5 years ago
- ☆18Updated 4 years ago
- Documentation on the Cyber Defense Matrix☆25Updated 2 years ago
- ☆98Updated 3 years ago
- Carbon Black API - Python language bindings☆145Updated last year
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆163Updated 6 months ago
- Grabs the administrator and authentication logs from the Duo Security API and sends CEF-formatted syslog.☆28Updated 9 years ago
- A small set of scripts to summarize AWS Security Groups, and generate visualizations of the rules.☆63Updated 5 years ago
- A collection of models for organizing, prioritizing, and understanding cybersecurity and information risk management concepts.☆24Updated 11 months ago
- Python installable command line utiltity for mitigation of host and key compromises.☆348Updated 4 years ago
- Built-in Panther detection rules and policies☆421Updated last week
- Deploy Kolide's Fleet into AWS using Terraform.☆15Updated 7 years ago
- Slack bot which promotes Defense in Depth/Zero Trust security practices☆24Updated 2 years ago
- ☆147Updated 2 weeks ago
- Audit log wall of shame.☆42Updated last month