SyntheticSun is a defense-in-depth security automation and monitoring framework which utilizes threat intelligence, machine learning, managed AWS security services and, serverless technologies to continuously prevent, detect and respond to threats.
☆82Jul 8, 2021Updated 4 years ago
Alternatives and similar repositories for SyntheticSun
Users that are interested in SyntheticSun are comparing it to the libraries listed below
Sorting:
- CloudSpec is an open source tool for validating your resources in your cloud providers using a logical language.☆26Jan 4, 2022Updated 4 years ago
- Sample DevSecOps pipelines (heavily biased on the "Sec") for various stacks and tools using open-source security tools and AWS native ser…☆72Sep 17, 2021Updated 4 years ago
- The Amazon Elastic Kubernetes Service (EKS) Creation Engine (ECE) is a Python command-line program created by the Lightspin Office of the…☆42Jan 9, 2023Updated 3 years ago
- Monitor the internet attack surface of various public cloud environments. Currently supports AWS, GCP, Azure, DigitalOcean and Oracle Clo…☆132Nov 16, 2025Updated 3 months ago
- This command line tool counts the number of resources in different categories across Amazon regions.☆59Dec 17, 2019Updated 6 years ago
- Minimalist containerized implementation of Prowler from https://github.com/toniblyx/prowler, made to run within ECS Fargate and have Secr…☆18May 17, 2019Updated 6 years ago
- Generates runbooks for GuardDuty findings☆38Jun 24, 2024Updated last year
- A collection of tools for managing and automating vulnerability management.☆13Mar 24, 2022Updated 3 years ago
- BAT is a tool to help everyone to securing their web-servers.☆10Mar 29, 2021Updated 4 years ago
- 'Continuous' AWS perimeter monitoring: Periodically scan internet facing AWS resources to detect misconfigured services.☆64Aug 9, 2019Updated 6 years ago
- Examples of Docker image build pipelines, including vulnerability scanning with Anchore Engine☆10Mar 6, 2019Updated 6 years ago
- Bring up a complete AWS Compute stack with VPC, EC2, and other dependencies using AWS CDK. Set up a Folding @ Home stack with couple of c…☆10Mar 25, 2021Updated 4 years ago
- Python Client for Nessus REST API☆13Feb 17, 2015Updated 11 years ago
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Jul 7, 2018Updated 7 years ago
- Sniper. Passive Secrets Hunting.🚬☆13Jun 3, 2022Updated 3 years ago
- Creates a CloudFormation stack for running Security Monkey☆27Mar 21, 2019Updated 6 years ago
- Cloud Security Operations Orchestrator☆188Apr 17, 2024Updated last year
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16May 21, 2021Updated 4 years ago
- 🐊 A small Password Attack☆15Apr 1, 2024Updated last year
- hterm: Browser terminal server using Google/Chrome's hterm emulator☆14Mar 4, 2017Updated 8 years ago
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆39Dec 17, 2025Updated 2 months ago
- ☆375Feb 23, 2024Updated 2 years ago
- vPrioritizer enables us to understand the contextualized risk (vPRisk) on asset-vulnerability relationship level across the organization,…☆69Jul 9, 2025Updated 7 months ago
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find them☆17Feb 1, 2021Updated 5 years ago
- This script is used to generate some basic detections of the aws security services☆72Feb 21, 2022Updated 4 years ago
- Burp Suite extension for extracting metadata from files☆20Dec 29, 2020Updated 5 years ago
- Deploy an "illegal" SOC to manage vulnerabilities on your city servers in minutes.☆20Dec 8, 2022Updated 3 years ago
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities l…☆49Nov 10, 2025Updated 3 months ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Apr 25, 2022Updated 3 years ago
- This Buffer Overflow Toolkit works through FTP, SMTP, POP, HTTP protocols as well file outputs for playlists exploiting customized variab…☆17Nov 12, 2021Updated 4 years ago
- A Workshop for AWS Security Hub Integration, Prioritization, and Response☆73Nov 8, 2023Updated 2 years ago
- AWS Security Tools (AST) in a simple Docker container.☆284May 20, 2021Updated 4 years ago
- Yet another content discovery tool☆119Nov 16, 2024Updated last year
- ☆17Mar 21, 2019Updated 6 years ago
- In this solution, we will walk through the steps required to automatically create and maintain a custom enterprise controls catalog and a…☆17Oct 17, 2023Updated 2 years ago
- ☆46Mar 20, 2021Updated 4 years ago
- Open source application to instantly remediate common security issues through the use of AWS Config☆219Sep 3, 2020Updated 5 years ago
- A honey token manager and alert system for AWS.☆320Dec 19, 2021Updated 4 years ago
- One way to continuously monitor sensitive information that could be exposed on Github☆173Jun 16, 2020Updated 5 years ago