☆191Mar 9, 2026Updated 2 weeks ago
Alternatives and similar repositories for dorothy
Users that are interested in dorothy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Built-in Panther detection rules and policies☆441Updated this week
- ☆169Sep 30, 2025Updated 5 months ago
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆339Mar 17, 2026Updated last week
- ☆2,525Updated this week
- A collection of my presentation materials.☆17Apr 29, 2024Updated last year
- Sublime rules for email attack detection, prevention, and threat hunting.☆352Updated this week
- Production-ready detection & response queries for osquery☆602Aug 13, 2025Updated 7 months ago
- ☆65May 21, 2024Updated last year
- ☆176Apr 22, 2023Updated 2 years ago
- macOS Initial Access Payload Generator☆323Jan 10, 2024Updated 2 years ago
- Repository to archive GCP Documentation for local use☆16Feb 11, 2025Updated last year
- Just another vulnerable web application.☆36Jul 27, 2024Updated last year
- Lightspin AWS IAM Vulnerability Scanner☆94Mar 28, 2021Updated 4 years ago
- Check IOC provided by a MISP instance on Suricata events☆18Jun 4, 2019Updated 6 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Jun 12, 2022Updated 3 years ago
- ☆100Feb 16, 2021Updated 5 years ago
- Scan GitHub Actions Workflow logs for IOCs☆16Mar 16, 2026Updated last week
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆58Sep 2, 2021Updated 4 years ago
- ☆20Apr 10, 2025Updated 11 months ago
- A C port of b33f's UrbanBishop☆38Oct 1, 2020Updated 5 years ago
- Socks4 reverse proxy for penetration testing. Python 2 and 3 compatible.☆17Jul 1, 2022Updated 3 years ago
- Serverless honeytoken 🕵🏻♂️☆81Jan 10, 2023Updated 3 years ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Aug 11, 2021Updated 4 years ago
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆88Jan 11, 2024Updated 2 years ago
- Granular, Actionable Adversary Emulation for the Cloud☆2,283Mar 12, 2026Updated last week
- Swift code to run a dylib on disk☆16May 9, 2022Updated 3 years ago
- AWS Metadata Proxy for protection against SSRF☆68Mar 3, 2020Updated 6 years ago
- Cloud Commotion intends to cause chaos to simulate security incidents☆146Jun 18, 2024Updated last year
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆174Mar 11, 2026Updated last week
- A Software as a Service (SaaS) log collection framework.☆184Mar 16, 2026Updated last week
- Tool for reconnaissance of AWS cloud environments☆16Oct 9, 2023Updated 2 years ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆142Jan 2, 2025Updated last year
- A tool to create COM class/interface relationships in neo4j☆50Oct 12, 2022Updated 3 years ago
- Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by devel…☆722Nov 14, 2025Updated 4 months ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- A production-friendly malware scanner for your AWS cloud☆201Jul 14, 2021Updated 4 years ago
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆123Updated this week
- Stupid Simple Detection Testing☆13Mar 7, 2024Updated 2 years ago
- Playing around with Stratus Red Team (Cloud Attack simulation tool) and SumoLogic☆307Jan 6, 2023Updated 3 years ago