cookpad / deepalertLinks
Serverless SOAR (Security Orchestration, Automation and Response) framework for automatic inspection and evaluation of security alert
☆47Updated 2 years ago
Alternatives and similar repositories for deepalert
Users that are interested in deepalert are comparing it to the libraries listed below
Sorting:
- Hands-on Exercises for "Dangerous attack paths: Modern Development Environment Security - Devices and CI/CD pipelines"☆44Updated 2 years ago
- Simple SOAR (Security Orchestration, Automation and Response) framework integrated with OPA/Rego☆23Updated 3 weeks ago
- Trivy based vulnerability management service☆55Updated 2 months ago
- Core A2P2V functionality (command line based)☆68Updated last year
- OpenCSPM Community Controls☆14Updated 4 years ago
- Build a local copy of Known Exploited Vulnerabilities Catalog by CISA. Server mode for easy querying.☆20Updated this week
- Automatically update IoC for lucky visitor scam☆26Updated last month
- R-CSIRT Linux Triage tool☆39Updated 6 years ago
- Fun tools around the EBS Direct API☆18Updated 4 years ago
- RISKEN is a monitoring tool for visualizing security risks.☆21Updated this week
- Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/)☆88Updated 2 years ago
- CDIR Analyzer - parsers for data collected by CDIR Collector☆18Updated last year
- RustyBlue is a rust implementation of DeepblueCLI, a forensics log analyzer for finding evidence of compromise from windows event logs.☆72Updated 2 years ago
- Modron - Cloud security compliance☆33Updated 5 months ago
- ☆10Updated 3 years ago
- The tutorial of "Kubernetes Security for Microservices"☆14Updated last year
- A recon tool for GCP Service Account Keys that requires no permissions☆22Updated last month
- IAM-Deescalate helps mitigate privilege escalation risk in AWS identity and access management (IAM)☆98Updated 2 years ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Updated 3 years ago
- ☆41Updated 6 months ago
- Scan your account for the use of untrusted AMIs☆20Updated last month
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14Updated this week
- Dependency Combobulator☆93Updated last year
- A toolset to juggle AWS roles for persistent access☆57Updated 9 months ago
- The Dirty Pipe Vulnerability☆46Updated 3 years ago
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.☆29Updated last year
- Based on Lightspin proprietary data, research, and our tracking of cloud security trends in the market, our research team has compiled a …☆40Updated 2 years ago
- AWSATT&CK adds MITRE ATT&CK context and additional logging capabilities to Rhino Security Labs's open-source AWS exploitation framework, …☆45Updated 4 years ago
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by use…☆70Updated 2 years ago
- Research on the enumeration of IAM permissions without logging to CloudTrail☆61Updated 3 years ago