Modron - Cloud security compliance
☆34Dec 11, 2024Updated last year
Alternatives and similar repositories for modron
Users that are interested in modron are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Oct 1, 2024Updated last year
- Eddie Vetter - triage macOS applications for security research☆16May 24, 2021Updated 4 years ago
- Back-end server (API) of waarzitje.nu.☆13Mar 2, 2026Updated 3 weeks ago
- My collection of Cloud Security Resources☆16Apr 16, 2025Updated 11 months ago
- A framework and taxonomy for identifying, classifying, and reasoning about detection logic bugs in SIEM, EDR, and XDR rules, with concret…☆45Mar 5, 2026Updated 2 weeks ago
- This repository includes a mapping table and a reference process that allows converting between STIX 2.1 Course of Action objects that ma…☆16Aug 24, 2022Updated 3 years ago
- GCP Audit checks projects in Google Cloud for compliance with CIS Benchmarks☆29May 19, 2025Updated 10 months ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61May 15, 2023Updated 2 years ago
- Run Sigma detection rules on logs from the new MacOS EndpointSecurity Framework☆22Jan 22, 2021Updated 5 years ago
- Adversary emulation for EDR/SIEM testing (macOS/Linux)☆53Mar 17, 2026Updated last week
- ☆11Dec 26, 2023Updated 2 years ago
- pocket guide for core detection engineering concepts☆31May 8, 2023Updated 2 years ago
- Yapscan is a YAra based Process SCANner, aimed at giving more control about what to scan and giving detailed reports on matches.☆61Jul 24, 2023Updated 2 years ago
- Slack bot which promotes Defense in Depth/Zero Trust security practices☆24Jan 17, 2023Updated 3 years ago
- General Open Architecture Security Questionnaire☆31Jul 25, 2023Updated 2 years ago
- ☆25May 13, 2019Updated 6 years ago
- Docker container of SANS Investigative Forensic Toolkit (SIFT) Workstation Version 3☆10Oct 9, 2016Updated 9 years ago
- Crashbench is a LLM benchmark to measure bug-finding and reporting capabilities of LLMs☆14Mar 8, 2026Updated 2 weeks ago
- ☆38Jan 30, 2025Updated last year
- Knowledge Report Alert & Normalization Generator☆26Feb 11, 2026Updated last month
- Hunting Newly Registered Domains☆10Jan 6, 2019Updated 7 years ago
- a hackbot proof-of-concept☆41Feb 24, 2024Updated 2 years ago
- ☆15Jul 20, 2022Updated 3 years ago
- ☆13Sep 20, 2022Updated 3 years ago
- Web based analysis platform for use with the AWS_IR command line tool.☆17Aug 4, 2016Updated 9 years ago
- AI-based implant feature☆25Apr 28, 2025Updated 10 months ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆67Jan 20, 2024Updated 2 years ago
- a small utility to generate a cookie in order to exploit a grafana vulnerability (CVE-2018-15727)☆22Aug 31, 2018Updated 7 years ago
- Assembly/Shellcode☆14Oct 28, 2014Updated 11 years ago
- Java RAT called STRRat - Source code & Deobfuscator☆12Aug 12, 2022Updated 3 years ago
- ☆13Oct 14, 2016Updated 9 years ago
- An Ubuntu 18.04 box for Mythic C2 framework development☆17Jun 17, 2022Updated 3 years ago
- This is the code repository for **Prompting Client**☆16Mar 17, 2026Updated last week
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- Lightweight macOS detection agent built on Santa’s Endpoint Security telemetry.☆109Dec 3, 2025Updated 3 months ago
- ☆13Aug 17, 2020Updated 5 years ago
- ☆86Feb 4, 2026Updated last month
- Collection of videos of Raids on Cybercriminals☆21Mar 19, 2025Updated last year
- ESF modular ingestion tool for development and research.☆38Dec 21, 2021Updated 4 years ago