Modron - Cloud security compliance
☆34Dec 11, 2024Updated last year
Alternatives and similar repositories for modron
Users that are interested in modron are comparing it to the libraries listed below
Sorting:
- Audit log wall of shame.☆42Aug 20, 2025Updated 6 months ago
- ☆11Dec 26, 2023Updated 2 years ago
- Crashbench is a LLM benchmark to measure bug-finding and reporting capabilities of LLMs☆14Jan 20, 2026Updated last month
- ☆19Jan 31, 2025Updated last year
- Back-end server (API) of waarzitje.nu.☆13Sep 22, 2025Updated 5 months ago
- pocket guide for core detection engineering concepts☆31May 8, 2023Updated 2 years ago
- This repository includes a mapping table and a reference process that allows converting between STIX 2.1 Course of Action objects that ma…☆16Aug 24, 2022Updated 3 years ago
- (Unofficial) Ruby wrapper for the Bugcrowd HTTP API☆14Feb 27, 2017Updated 9 years ago
- A framework and taxonomy for identifying, classifying, and reasoning about detection logic bugs in SIEM, EDR, and XDR rules, with concret…☆42Feb 22, 2026Updated last week
- Eddie Vetter - triage macOS applications for security research☆16May 24, 2021Updated 4 years ago
- a hackbot proof-of-concept☆41Feb 24, 2024Updated 2 years ago
- AI-based implant feature☆25Apr 28, 2025Updated 10 months ago
- Web based analysis platform for use with the AWS_IR command line tool.☆17Aug 4, 2016Updated 9 years ago
- Adversary emulation for EDR/SIEM testing (macOS/Linux)☆53Feb 10, 2026Updated 3 weeks ago
- ☆20Jan 9, 2024Updated 2 years ago
- Run Sigma detection rules on logs from the new MacOS EndpointSecurity Framework☆22Jan 22, 2021Updated 5 years ago
- ☆25May 13, 2019Updated 6 years ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆67Jan 20, 2024Updated 2 years ago
- ☆35Jan 30, 2025Updated last year
- Knowledge Report Alert & Normalization Generator☆26Feb 11, 2026Updated 2 weeks ago
- Simple S3 Bucket Testing Software☆31Nov 4, 2021Updated 4 years ago
- ☆23Sep 20, 2024Updated last year
- KEV EPSS Data☆31Updated this week
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Jan 19, 2026Updated last month
- A set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard certificate in as simple a p…☆30Nov 30, 2025Updated 3 months ago
- Automated vulnerability discovery and annotation☆68Jul 26, 2024Updated last year
- ☆29Jan 31, 2025Updated last year
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆60Mar 12, 2022Updated 3 years ago
- Track progress and keep notes while working through likethecoins' CTI Self Study Plan☆29Aug 25, 2022Updated 3 years ago
- Clean accounts over permissions in GCP infra at scale☆71May 9, 2023Updated 2 years ago
- Automated testing, generation & manipulation of #osquery packs☆74Oct 16, 2024Updated last year
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by use…☆74Dec 14, 2022Updated 3 years ago
- Rapports techniques de VIGINUM☆36Sep 15, 2025Updated 5 months ago
- ☆10Apr 20, 2022Updated 3 years ago
- machofile is a module to parse Mach-O binary files☆94Feb 10, 2026Updated 3 weeks ago
- ☆33Jun 12, 2024Updated last year
- List (or plunder) private repos/gists to which a token has access, including those of other users☆10Jan 29, 2022Updated 4 years ago
- ☆30Jan 13, 2026Updated last month
- Lightweight macOS detection agent built on Santa’s Endpoint Security telemetry.☆105Dec 3, 2025Updated 3 months ago