gyrospectre / squyreLinks
Security Alert Decoration
☆27Updated 3 months ago
Alternatives and similar repositories for squyre
Users that are interested in squyre are comparing it to the libraries listed below
Sorting:
- Knowledge Report Alert & Normalization Generator☆27Updated last year
- ☆31Updated 4 months ago
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆32Updated last year
- Fun tools around the EBS Direct API☆19Updated 4 years ago
- Compares and analyzes GCP IAM roles.☆77Updated 7 months ago
- Convert cloudtrail data to MITRE ATT&CK Sightings☆80Updated 3 years ago
- A recon tool for GCP Service Account Keys that requires no permissions☆24Updated 6 months ago
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events i…☆51Updated 5 months ago
- https://breaches.cloud☆42Updated last year
- Automated testing, generation & manipulation of #osquery packs☆73Updated last year
- ☆47Updated 11 months ago
- Slack bot which promotes Defense in Depth/Zero Trust security practices☆24Updated 2 years ago
- ☆65Updated last year
- Attaché provides an emulation layer for Cloud Provider IMDS APIs☆60Updated last year
- Generates runbooks for GuardDuty findings☆39Updated last year
- Tool for obfuscating and deobfuscating data.☆73Updated last year
- HashiCorp-relevant rules for the Semgrep code analysis tool☆42Updated 2 years ago
- ☆25Updated last year
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆51Updated 11 months ago
- ☆50Updated 11 months ago
- ☆31Updated 11 months ago
- Repository to archive GCP Documentation for local use☆16Updated 8 months ago
- Audit log wall of shame.☆42Updated 2 months ago
- AWSXenos will list all the trust relationships in all the IAM roles, S3 buckets, and more☆64Updated 7 months ago
- GCP CSPM using Google Sheets☆37Updated 6 months ago
- A collection of models for organizing, prioritizing, and understanding cybersecurity and information risk management concepts.☆24Updated last year
- ☆50Updated last month
- Clean accounts over permissions in GCP infra at scale☆71Updated 2 years ago
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.☆15Updated 4 years ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Updated 3 years ago