CrowdStrike Falcon log forwarder from falcon S3 bucket to your S3 bucket
☆11Apr 15, 2021Updated 4 years ago
Alternatives and similar repositories for aws-falcon-data-forwarder
Users that are interested in aws-falcon-data-forwarder are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Public AutoPkg CI with Jenkins.☆14Jun 19, 2016Updated 9 years ago
- Whitepaper on Munki for Mac Management☆13Jun 3, 2016Updated 9 years ago
- Scripts to mass-generate specific autopkg recipes☆25Nov 17, 2014Updated 11 years ago
- ☆22Feb 24, 2018Updated 8 years ago
- A Docker container for Crypt Server that uses SAML☆19Feb 20, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A Puppet module to administer Mac OS X Machines☆23Jul 8, 2017Updated 8 years ago
- ☆15Jun 2, 2015Updated 10 years ago
- OLD - DO NOT USE! Use arubdesu/office-recipes instead☆19Feb 2, 2017Updated 9 years ago
- This is a Python script that uses the private SoftwareUpdate framework to download packages from Apple's Software Update servers using a …☆45Nov 5, 2021Updated 4 years ago
- Pokes users about outstanding security risks found by Crowdstrike Spotlight or vmware Workspace ONE so they secure their own endpoint.☆30Updated this week
- Secure your munki repo in Google Cloud Storage☆25Nov 21, 2022Updated 3 years ago
- A tool that allows you to document and assess any security automation in your SOC☆49Oct 31, 2024Updated last year
- Find-and-replace patterns for the Go language.☆10Sep 24, 2022Updated 3 years ago
- Admin Submission API allows submission of URLs, mail messages, file mail messages and files to Microsoft to re-scan and get newest verdic…☆10Aug 6, 2021Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Integration for the Darwin NSURLSession API for Requests.☆13Jun 20, 2016Updated 9 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- Repotoddy is a continuous deployment tool that works in conjunction with Reposado. An open source tool that replicates the key functional…☆27Aug 10, 2017Updated 8 years ago
- Build your first Mac app with Xcode☆11Nov 17, 2016Updated 9 years ago
- AIM - The open-source NHI platform for AI agents. Cryptographic identity, governance, and access control.☆38Updated this week
- Modeling, analyzing and rendering attack trees.☆11Sep 9, 2021Updated 4 years ago
- NOVA - Claude Code Protection System against prompt injection attacks☆85Feb 7, 2026Updated last month
- Serverless powered lambda function to convert Bitbucket webhook msgs into AWS SNS☆12Jun 28, 2017Updated 8 years ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14May 28, 2025Updated 9 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Scan Apple SUCatalogs and Extract Build Numbers☆13Jan 9, 2020Updated 6 years ago
- fde-rekey is a tool used to rotate/generate a macOS filevault2 personal recovery key without user interaction.☆32Sep 25, 2017Updated 8 years ago
- ☆29Sep 19, 2016Updated 9 years ago
- Puppet Module for managing macOS + OS X Configuration Profiles☆11Jun 29, 2020Updated 5 years ago
- Create Hugo static website generator on AWS Lambda with Terraform☆16Dec 20, 2018Updated 7 years ago
- Anthropic's Contextual Retrieval implementation with visual chunk comparison. Preview context enrichment before/after embedding.☆26Sep 25, 2025Updated 6 months ago
- Point of Concept: To help to automate the collection of evidence for SOC 2 Audits and etc.☆11May 13, 2024Updated last year
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆57Mar 2, 2026Updated 3 weeks ago
- Rapid Response sample Foundry app☆17Updated this week
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆62Nov 26, 2025Updated 3 months ago
- An efficient algorithm for k-bounded (Damerau-)Levenshtein distance☆16Oct 13, 2018Updated 7 years ago
- ☆10Sep 2, 2015Updated 10 years ago
- Revives the last functional CUDA deep-learning stack on macOS High Sierra. NVIDIA CUDA 10.2 + cuDNN 7.6.5 + PyTorch 1.7.0 fully working o…☆27Nov 14, 2025Updated 4 months ago
- Send GKE audit events to falco☆12Jan 8, 2023Updated 3 years ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Mar 1, 2021Updated 5 years ago
- Manage linux luks client devices and escrow recovery keys to crypt-server☆49Updated this week