cookpad / deepalert
Serverless SOAR (Security Orchestration, Automation and Response) framework for automatic inspection and evaluation of security alert
☆45Updated last year
Alternatives and similar repositories for deepalert:
Users that are interested in deepalert are comparing it to the libraries listed below
- Hands-on Exercises for "Dangerous attack paths: Modern Development Environment Security - Devices and CI/CD pipelines"☆45Updated 2 years ago
- Simple SOAR (Security Orchestration, Automation and Response) framework integrated with OPA/Rego☆23Updated 3 weeks ago
- Trivy based vulnerability management service☆55Updated 2 months ago
- RustyBlue is a rust implementation of DeepblueCLI, a forensics log analyzer for finding evidence of compromise from windows event logs.☆70Updated 2 years ago
- The tutorial of "Kubernetes Security for Microservices"☆14Updated last year
- Build a local copy of Known Exploited Vulnerabilities Catalog by CISA. Server mode for easy querying.☆18Updated this week
- Automatically update IoC for lucky visitor scam☆26Updated this week
- Core A2P2V functionality (command line based)☆67Updated 9 months ago
- CVEs <--> Metasploit-Framework modules☆23Updated last week
- RISKEN is a monitoring tool for visualizing security risks.☆21Updated this week
- OpenCSPM Community Controls☆14Updated 3 years ago
- ☆10Updated 2 years ago
- R-CSIRT Linux Triage tool☆38Updated 6 years ago
- Modron - Cloud security compliance☆33Updated 2 months ago
- The Dirty Pipe Vulnerability☆47Updated 2 years ago
- VulsRepo is visualized based on the json report output in vuls.☆34Updated 3 years ago
- Ghidra Script for automated analysis of EMOTET☆17Updated 4 years ago
- ☆40Updated last month
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Updated 3 years ago
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆51Updated this week
- CDIR Analyzer - parsers for data collected by CDIR Collector☆18Updated last year
- This repository hosts community contributed Kestrel huntflows (.hf) and huntbooks (.ipynb)☆32Updated last year
- A dataset with CloudTrail events from an attack simulation using Stratus.☆19Updated last year
- Decentralized Cyber Threat Intelligence Kaizen Framework☆23Updated 3 years ago
- pocket guide for core detection engineering concepts☆27Updated last year
- EXIST is a web application for aggregating and analyzing cyber threat intelligence.☆151Updated 2 years ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆13Updated 11 months ago
- ☆31Updated 3 months ago
- Serverless honeytoken 🕵🏻♂️☆79Updated 2 years ago
- Workflows for Shuffle☆21Updated 2 years ago