cookpad / deepalertLinks
Serverless SOAR (Security Orchestration, Automation and Response) framework for automatic inspection and evaluation of security alert
☆49Updated 2 years ago
Alternatives and similar repositories for deepalert
Users that are interested in deepalert are comparing it to the libraries listed below
Sorting:
- Hands-on Exercises for "Dangerous attack paths: Modern Development Environment Security - Devices and CI/CD pipelines"☆45Updated 2 years ago
- Simple SOAR (Security Orchestration, Automation and Response) framework integrated with OPA/Rego☆24Updated last week
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by use…☆71Updated 2 years ago
- Core A2P2V functionality (command line based)☆68Updated last year
- Serverless honeytoken 🕵🏻♂️☆79Updated 2 years ago
- R-CSIRT Linux Triage tool☆39Updated 7 years ago
- Decentralized Cyber Threat Intelligence Kaizen Framework☆26Updated 3 years ago
- RustyBlue is a rust implementation of DeepblueCLI, a forensics log analyzer for finding evidence of compromise from windows event logs.☆72Updated 2 years ago
- ☆44Updated 4 months ago
- Build a local copy of Known Exploited Vulnerabilities Catalog by CISA. Server mode for easy querying.☆21Updated last week
- Dependency Combobulator☆93Updated last year
- OpenCSPM Community Controls☆14Updated 4 years ago
- Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/)☆89Updated 2 years ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆65Updated last year
- IAM-Deescalate helps mitigate privilege escalation risk in AWS identity and access management (IAM)☆98Updated 2 years ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Updated 3 years ago
- API client for crt.sh☆41Updated 4 years ago
- Trivy based vulnerability management service☆55Updated 4 months ago
- Simulates a compromise in a cloud and container environment☆32Updated 6 months ago
- The tutorial of "Kubernetes Security for Microservices"☆14Updated last year
- Utility for downloading and mounting EBS snapshots using the EBS Direct API's☆86Updated 3 months ago
- Scan your account for the use of untrusted AMIs☆23Updated 2 months ago
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆330Updated 2 months ago
- ☆46Updated 8 months ago
- Jimi is an automation first no-code platform designed and developed originally for Security Orchestration and Response. Since its launch …☆165Updated last year
- Lightspin AWS IAM Vulnerability Scanner☆96Updated 4 years ago
- A public cloud security knowledgebase - https://www.secwiki.cloud/☆51Updated 8 months ago
- Automatically update IoC for lucky visitor scam☆26Updated 3 months ago
- GCP cloud security CTF☆45Updated 2 weeks ago
- EXIST is a web application for aggregating and analyzing cyber threat intelligence.☆152Updated 2 years ago