Dynamically generate and hunt with Lacework LQL queries quickly and efficiently
☆27Sep 29, 2023Updated 2 years ago
Alternatives and similar repositories for Cloud-Hunter
Users that are interested in Cloud-Hunter are comparing it to the libraries listed below
Sorting:
- A command line tool for generating Lacework FortiCNAPP Reports☆17Apr 30, 2025Updated 10 months ago
- A python module to allow for easy integration with the Lacework APIs.☆18Jul 12, 2024Updated last year
- ☆13Jan 4, 2023Updated 3 years ago
- Official Lacework Helm Charts☆12Mar 3, 2026Updated 2 weeks ago
- customize Synology DSM devices☆12Jan 11, 2023Updated 3 years ago
- Public release of Whalehoney Honeypot☆29Mar 21, 2022Updated 4 years ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆30Feb 16, 2025Updated last year
- Convert cloudtrail data to MITRE ATT&CK Sightings☆82Jul 25, 2022Updated 3 years ago
- extracts shellcode from a nasm compile macho binary☆17Jan 28, 2021Updated 5 years ago
- SIEM USE Case Selection Methodology☆17Sep 18, 2020Updated 5 years ago
- ☆39Jul 31, 2025Updated 7 months ago
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆36Mar 10, 2026Updated last week
- ☆12Feb 8, 2023Updated 3 years ago
- ☆11Aug 16, 2023Updated 2 years ago
- Highly Scalable Enterprise grade ElasticSearch (ELK stake) deployment on Kubernetes Platform☆11Jan 10, 2020Updated 6 years ago
- Multi Cloud Antivirus Scanning API using YARA and CLAMAV for AWS S3, Azure Blob Storage and GCP Cloud Storage☆22Sep 1, 2024Updated last year
- kubernetes-for-soc aims to fast-track the learning curve for SOC analysts by enabling them to swiftly grasp the essential concepts and kn…☆56Dec 18, 2023Updated 2 years ago
- Integrate IBM QRadar and RPA to automate security L1 tasks.☆14May 20, 2022Updated 3 years ago
- Batch IP geolocation script.☆21Jul 13, 2017Updated 8 years ago
- AWS CloudFormation templates and Python code for AWS blog post on how to automate IAM credential reports at scale across AWS.☆18Sep 19, 2022Updated 3 years ago
- php implementation of google protobuf☆15Aug 23, 2011Updated 14 years ago
- Telegram bot for the Lockdoor Framework☆14Dec 15, 2019Updated 6 years ago
- It records your terminal, then lets you upload to ASHIRT☆29Mar 12, 2026Updated last week
- Python connector for UniFi Access☆21Nov 12, 2025Updated 4 months ago
- A Swift port of some of the original PersistentJXA projects by D00MFist. Original PersistentJXA repo: https://github.com/D00MFist/Persist…☆34Apr 15, 2021Updated 4 years ago
- GitHub action for validating Microsoft Sentinel detection rules☆14May 22, 2023Updated 2 years ago
- terraform deployment for red team☆26Dec 13, 2022Updated 3 years ago
- ☆38Jan 7, 2025Updated last year
- Coalfire AWS RAMP/pak Reference Architecture☆37Aug 29, 2024Updated last year
- ☆15Jan 27, 2022Updated 4 years ago
- This repository is a carefully chosen collection of cloud security-related interview questions and scenarios. This resource will help you…☆31Feb 6, 2026Updated last month
- Open-source proof-of-concept client for AWS IAM Roles Anywhere☆71Sep 16, 2022Updated 3 years ago
- Configuration of LogStash (and Filebeat) for Analytics treatment.☆17Jun 25, 2018Updated 7 years ago
- ☆31Feb 10, 2023Updated 3 years ago
- This implementation demonstrates the AWS Identity and Access Management (IAM) Access Analyzer policy validation capability. Learn how to …☆24Jun 16, 2022Updated 3 years ago
- AWSATT&CK adds MITRE ATT&CK context and additional logging capabilities to Rhino Security Labs's open-source AWS exploitation framework, …☆45Mar 5, 2021Updated 5 years ago
- Use SQL to instantly query host, DNS and exploit information using Shodan. Open source CLI. No DB required.☆29Updated this week
- ☆18May 5, 2024Updated last year
- bddem is a SWI-Prolog pack for using Binary Decision Diagrams☆12Aug 30, 2025Updated 6 months ago