☆194Apr 22, 2026Updated last week
Alternatives and similar repositories for dorothy
Users that are interested in dorothy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Built-in Panther detection rules and policies☆448Updated this week
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆341Apr 26, 2026Updated last week
- ☆170Sep 30, 2025Updated 7 months ago
- ☆2,563Updated this week
- A collection of my presentation materials.☆17Apr 29, 2024Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Sublime rules for email attack detection, prevention, and threat hunting.☆361Updated this week
- Production-ready detection & response queries for osquery☆603Apr 22, 2026Updated last week
- ☆65May 21, 2024Updated last year
- ☆178Apr 22, 2023Updated 3 years ago
- macOS Initial Access Payload Generator☆323Jan 10, 2024Updated 2 years ago
- Repository to archive GCP Documentation for local use☆16Feb 11, 2025Updated last year
- Just another vulnerable web application.☆36Jul 27, 2024Updated last year
- Lightspin AWS IAM Vulnerability Scanner☆95Mar 28, 2021Updated 5 years ago
- Check IOC provided by a MISP instance on Suricata events☆18Jun 4, 2019Updated 6 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Jun 12, 2022Updated 3 years ago
- ☆100Feb 16, 2021Updated 5 years ago
- Scan GitHub Actions Workflow logs for IOCs☆17Apr 22, 2026Updated last week
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆58Sep 2, 2021Updated 4 years ago
- Hikeshi is a security incident response application that keeps documenting incidents simple, so you can focus on fighting fires.☆21Mar 6, 2023Updated 3 years ago
- A C port of b33f's UrbanBishop☆38Oct 1, 2020Updated 5 years ago
- ☆20Apr 10, 2025Updated last year
- Socks4 reverse proxy for penetration testing. Python 2 and 3 compatible.☆17Jul 1, 2022Updated 3 years ago
- Serverless honeytoken 🕵🏻♂️☆81Jan 10, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A tool to modify timestamps in a packet capture to a user selected date☆31Aug 11, 2021Updated 4 years ago
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆89Jan 11, 2024Updated 2 years ago
- Granular, Actionable Adversary Emulation for the Cloud☆2,304Updated this week
- Swift code to run a dylib on disk☆16May 9, 2022Updated 3 years ago
- AWS Metadata Proxy for protection against SSRF☆68Mar 3, 2020Updated 6 years ago
- Cloud Commotion intends to cause chaos to simulate security incidents☆148Jun 18, 2024Updated last year
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆175Mar 11, 2026Updated last month
- A Software as a Service (SaaS) log collection framework.☆186Apr 13, 2026Updated 2 weeks ago
- Tool for reconnaissance of AWS cloud environments☆16Oct 9, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆143Jan 2, 2025Updated last year
- A tool to create COM class/interface relationships in neo4j☆50Oct 12, 2022Updated 3 years ago
- Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by devel…☆736Apr 24, 2026Updated last week
- A production-friendly malware scanner for your AWS cloud☆200Jul 14, 2021Updated 4 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 4 years ago
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆130Apr 23, 2026Updated last week
- Stupid Simple Detection Testing☆13Mar 7, 2024Updated 2 years ago