cookpad / aws-falcon-data-forwarderLinks
CrowdStrike Falcon log forwarder from falcon S3 bucket to your S3 bucket
☆11Updated 4 years ago
Alternatives and similar repositories for aws-falcon-data-forwarder
Users that are interested in aws-falcon-data-forwarder are comparing it to the libraries listed below
Sorting:
- ☆65Updated last year
- ☆46Updated last year
- ☆41Updated last month
- Simple Docker-based quickstart for osquery, Fleet, and ELK stack☆63Updated last year
- Osquery Mangement Server☆114Updated 4 years ago
- ☆120Updated 2 weeks ago
- A POC to implement Detection-as-Code with Terraform and Sumo Logic.☆29Updated last year
- ☆72Updated 9 months ago
- Cloud security tutorials and best practices☆38Updated 2 years ago
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆162Updated 3 months ago
- Falcon Data Replicator☆31Updated last month
- ☆95Updated 2 years ago
- pocket guide for core detection engineering concepts☆28Updated 2 years ago
- Automated testing, generation & manipulation of #osquery packs☆73Updated 7 months ago
- ☆18Updated 3 years ago
- Dorothy is a tool to test security monitoring and detection for Okta environments☆182Updated 9 months ago
- A tool that allows you to document and assess any security automation in your SOC☆46Updated 7 months ago
- Scripts from my book OS X Incident Response Scripting and Analysis -> https://www.amazon.com/dp/012804456X/ref=cm_sw_r_tw_dp_U_x_fQeLAb68…☆49Updated 8 years ago
- A small set of scripts to summarize AWS Security Groups, and generate visualizations of the rules.☆62Updated 4 years ago
- Remote Memory Acquisition Tool☆246Updated 4 years ago
- Recon Hunt Queries☆77Updated 4 years ago
- GCP CSPM using Google Sheets☆36Updated 2 months ago
- Documentation on the Cyber Defense Matrix☆24Updated 2 years ago
- Carbon Black Feeds☆72Updated 2 years ago
- This script is used to generate some basic detections of the aws security services☆71Updated 3 years ago
- Slack bot which promotes Defense in Depth/Zero Trust security practices☆24Updated 2 years ago
- Run individual configuration, compliance and security controls or full compliance benchmarks for CIS for Zoom using Powerpipe and Steampi…☆66Updated 7 months ago
- Carbon Black API - Python language bindings☆145Updated 9 months ago
- Audit log wall of shame.☆41Updated 7 months ago
- ☆48Updated 9 years ago