cookpad / aws-falcon-data-forwarderView external linksLinks
CrowdStrike Falcon log forwarder from falcon S3 bucket to your S3 bucket
☆11Apr 15, 2021Updated 4 years ago
Alternatives and similar repositories for aws-falcon-data-forwarder
Users that are interested in aws-falcon-data-forwarder are comparing it to the libraries listed below
Sorting:
- Public AutoPkg CI with Jenkins.☆14Jun 19, 2016Updated 9 years ago
- Whitepaper on Munki for Mac Management☆13Jun 3, 2016Updated 9 years ago
- Scripts to mass-generate specific autopkg recipes☆25Nov 17, 2014Updated 11 years ago
- A Docker container for Crypt Server that uses SAML☆19Feb 20, 2025Updated 11 months ago
- ☆22Feb 24, 2018Updated 7 years ago
- A Puppet module to administer Mac OS X Machines☆23Jul 8, 2017Updated 8 years ago
- OLD - DO NOT USE! Use arubdesu/office-recipes instead☆19Feb 2, 2017Updated 9 years ago
- ☆15Jun 2, 2015Updated 10 years ago
- Secure your munki repo in Google Cloud Storage☆25Nov 21, 2022Updated 3 years ago
- This is a Python script that uses the private SoftwareUpdate framework to download packages from Apple's Software Update servers using a …☆45Nov 5, 2021Updated 4 years ago
- Pokes users about outstanding security risks found by Crowdstrike Spotlight or vmware Workspace ONE so they secure their own endpoint.☆29Updated this week
- Repotoddy is a continuous deployment tool that works in conjunction with Reposado. An open source tool that replicates the key functional…☆27Aug 10, 2017Updated 8 years ago
- NOVA - Claude Code Protection System against prompt injection attacks☆73Updated this week
- ☆29Sep 19, 2016Updated 9 years ago
- fde-rekey is a tool used to rotate/generate a macOS filevault2 personal recovery key without user interaction.☆32Sep 25, 2017Updated 8 years ago
- A Sal client written in Go☆35Oct 25, 2023Updated 2 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- Example scripts for MDM tools☆41Jul 22, 2020Updated 5 years ago
- Solve problems of device identity, certificates and the keychain.☆13Jan 3, 2019Updated 7 years ago
- Admin Submission API allows submission of URLs, mail messages, file mail messages and files to Microsoft to re-scan and get newest verdic…☆10Aug 6, 2021Updated 4 years ago
- Rapid Response sample Foundry app☆14Updated this week
- Manage linux luks client devices and escrow recovery keys to crypt-server☆48Jan 19, 2026Updated 3 weeks ago
- ☆10Sep 2, 2015Updated 10 years ago
- Point of Concept: To help to automate the collection of evidence for SOC 2 Audits and etc.☆11May 13, 2024Updated last year
- Serverless powered lambda function to convert Bitbucket webhook msgs into AWS SNS☆12Jun 28, 2017Updated 8 years ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14May 28, 2025Updated 8 months ago
- What changed?☆18Jan 8, 2017Updated 9 years ago
- Button Combination (Shortcut) tables for the Roland MC-707 Groovebox☆11Nov 19, 2023Updated 2 years ago
- Securely access a munki repo hosted on Backblaze B2☆10Sep 18, 2020Updated 5 years ago
- Build your first Mac app with Xcode☆11Nov 17, 2016Updated 9 years ago
- Modeling, analyzing and rendering attack trees.☆11Sep 9, 2021Updated 4 years ago
- Ensure you know if systems don't work like they should - with Operational Verification and Validation resources☆11Jan 31, 2022Updated 4 years ago
- Take any Computer/Mobile Advanced Search in the JSS and publish it to Google Sheets☆13Oct 9, 2015Updated 10 years ago
- Scan Apple SUCatalogs and Extract Build Numbers☆13Jan 9, 2020Updated 6 years ago
- The future of DevOps☆10Jan 27, 2022Updated 4 years ago
- A tool that allows you to document and assess any security automation in your SOC☆49Oct 31, 2024Updated last year
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆55Updated this week
- Example Express application for collecting data from the Stethoscope app☆14May 30, 2018Updated 7 years ago
- CRUSOE: A Toolset for Cyber Situational Awareness and Decision Support in Incident Handling Inspired by the OODA Loop☆15Dec 11, 2024Updated last year