Send high priority Deep Security events to the AWS Security Hub
☆14Jul 31, 2019Updated 6 years ago
Alternatives and similar repositories for aws-security-hub
Users that are interested in aws-security-hub are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- AWS Quick Start Team☆16Oct 3, 2024Updated last year
- Deep Security's APIs make it simple to integration with a variety of AWS Services☆19Apr 24, 2019Updated 6 years ago
- A hands-on workshop to learn how to do threat detection and response in AWS.☆11Sep 13, 2021Updated 4 years ago
- Cloud threat detection visualization from excalidraw☆12Apr 25, 2022Updated 3 years ago
- Alternative password shadowing scheme☆10Feb 22, 2026Updated last month
- 🌌 Real-time threat detection for smart contracts☆10May 16, 2023Updated 2 years ago
- ☆38Jul 3, 2025Updated 8 months ago
- Event Query Router☆12Aug 9, 2019Updated 6 years ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- ☆13Oct 7, 2019Updated 6 years ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆17Jan 5, 2023Updated 3 years ago
- ETHICAL-HACKING☆12Dec 20, 2023Updated 2 years ago
- Some handy bash scripts I used for the OSCP☆24Oct 1, 2022Updated 3 years ago
- Legacy password hashing framework for PHP applications needing to support or having previously supported PHP below 5.5☆16Nov 22, 2024Updated last year
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- Queries for Carbon Black Response☆11Feb 11, 2020Updated 6 years ago
- Deep Security's APIs make it simple to integration with a variety of AWS Services☆28Aug 19, 2019Updated 6 years ago
- Security testing toolkit for Claude Code: curated SecLists wordlists, injection payloads, and expert agents for authorized pentesting, CT…☆91Feb 19, 2026Updated last month
- Test Suite for John the Ripper☆25Dec 28, 2025Updated 2 months ago
- Quick script to build host or investigation timelines using Carbon Black Response☆12Sep 25, 2018Updated 7 years ago
- Small container runtime for threat detection☆14Apr 13, 2025Updated 11 months ago
- AWS GD2ACL☆57Jul 26, 2024Updated last year
- Implementation of bcrypt password hashing scheme☆12Jan 11, 2021Updated 5 years ago
- Detection rules and threat hunting queries in Defender XDR and Azure Sentinel☆16Mar 13, 2026Updated last week
- ☆13Nov 5, 2024Updated last year
- A fork of APIviz with out of the box support for classes compiled with Java 8.☆10Apr 15, 2018Updated 7 years ago
- Interactive CD dependency diagram☆29Feb 15, 2026Updated last month
- Threat Detection Rules (Snort/Sigma/Yara)☆14Jan 23, 2024Updated 2 years ago
- ⚡️Easily define a base path where your serverless functions are located☆13Jul 18, 2023Updated 2 years ago
- 威胁检测规则集☆15Jul 5, 2019Updated 6 years ago
- Plugin which auto-subscribes a log delivery lambda function to lambda log groups created by serverless☆12Apr 17, 2023Updated 2 years ago
- Scripts and Modules for forensical analyses of mysql database systems☆22Sep 19, 2014Updated 11 years ago
- ☆37May 13, 2020Updated 5 years ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆12Jun 24, 2021Updated 4 years ago
- Ultimate LED panel. 8x8 matrix. APA102 RGB LEDs☆12Mar 12, 2024Updated 2 years ago
- Demonstrates an approach to invoking AWS Lambda from messages in an Amazon MQ queue.☆24Jan 9, 2020Updated 6 years ago
- Contains research.splunk.com site code☆11Apr 10, 2024Updated last year
- CSV Manager for AWS Security Hub exports SecurityHub findings to a CSV file and allows you to mass-update SecurityHub findings by modifyi…☆17Jul 23, 2025Updated 8 months ago