A Software as a Service (SaaS) log collection framework.
☆186Apr 13, 2026Updated 2 weeks ago
Alternatives and similar repositories for grove
Users that are interested in grove are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Substation is a toolkit for routing, normalizing, and enriching security event and audit logs.☆397Jan 20, 2026Updated 3 months ago
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆341Apr 26, 2026Updated last week
- The Event Maturity Matrix (EMM) is a comprehensive framework that provides clarity regarding the capabilities and nuances of SaaS audit l…☆30Apr 16, 2026Updated 2 weeks ago
- Open source security data lake for threat hunting, detection & response, and cybersecurity analytics at petabyte scale on AWS☆1,670Jan 8, 2025Updated last year
- AWS STS token decoder☆47Mar 18, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- pocket guide for core detection engineering concepts☆31May 8, 2023Updated 2 years ago
- ☆83Dec 5, 2019Updated 6 years ago
- ☆33Apr 10, 2026Updated 3 weeks ago
- Collection of operational focused osquery dashboards.☆10Jan 20, 2021Updated 5 years ago
- Knowledge Report Alert & Normalization Generator☆26Apr 23, 2026Updated last week
- Centralizing AWS CloudWatch log forwarding via EventBridge and Step Functions☆48Feb 12, 2023Updated 3 years ago
- Slack bot which promotes Defense in Depth/Zero Trust security practices☆24Jan 17, 2023Updated 3 years ago
- Audit log wall of shame.☆42Aug 20, 2025Updated 8 months ago
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆175Mar 11, 2026Updated last month
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Automated testing, generation & manipulation of #osquery packs☆74Apr 10, 2026Updated 3 weeks ago
- ☆194Apr 22, 2026Updated last week
- Lightweight macOS detection agent built on Santa’s Endpoint Security telemetry.☆111Dec 3, 2025Updated 5 months ago
- cloudgrep is grep for cloud storage☆329Mar 14, 2026Updated last month
- ☆14Jan 8, 2026Updated 3 months ago
- GCP CSPM using Google Sheets☆38Apr 4, 2025Updated last year
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Jan 12, 2024Updated 2 years ago
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆106Nov 24, 2023Updated 2 years ago
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆179Mar 2, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆18Sep 13, 2021Updated 4 years ago
- Whois for the Cloud: Recon tool for cloud provider attribution. Supports AWS, Azure, Google, Cloudflare, and Digital Ocean.☆184Oct 9, 2025Updated 6 months ago
- Built-in Panther detection rules and policies☆448Updated this week
- This is a collection of threat detection rules / rules engines that I have come across.☆298May 5, 2024Updated last year
- ☆22Apr 17, 2023Updated 3 years ago
- Enumerate Location Services using CoreLocation API on macOS☆18Dec 2, 2021Updated 4 years ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆44Sep 12, 2024Updated last year
- Granular, Actionable Adversary Emulation for the Cloud☆2,304Updated this week
- An extensible machine learning model store and model transformation and distribution service☆14Mar 12, 2023Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆170Sep 30, 2025Updated 7 months ago
- Collection of example YARA-L rules for use within Google Security Operations☆488Apr 20, 2026Updated 2 weeks ago
- A collection of models for organizing, prioritizing, and understanding cybersecurity and information risk management concepts.☆26Oct 3, 2024Updated last year
- Command line tool for working with Panther rules and policies☆48Updated this week
- Production-ready detection & response queries for osquery☆603Apr 22, 2026Updated last week
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- ☆30Jan 13, 2026Updated 3 months ago