panther-labs / panther-analysis
Built-in Panther detection rules and policies
☆373Updated this week
Alternatives and similar repositories for panther-analysis:
Users that are interested in panther-analysis are comparing it to the libraries listed below
- Dorothy is a tool to test security monitoring and detection for Okta environments☆181Updated 8 months ago
- ☆386Updated last year
- 🚨ATTENTION🚨 The Security Stack Mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is k…☆384Updated last year
- ☆371Updated last year
- Collection of example YARA-L rules for use within Google Security Operations☆381Updated 2 weeks ago
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆329Updated last year
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆276Updated last year
- Open Cloud Security Posture Management Engine☆339Updated 3 years ago
- Substation is a toolkit for routing, normalizing, and enriching security event and audit logs.☆355Updated last month
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆154Updated last month
- A knowledge base of actionable Incident Response techniques☆636Updated 2 years ago
- 🚨ATTENTION🚨 The NIST 800-53 mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept…☆491Updated last year
- Released at Black Hat Asia on April 18, 2024, Cloud Console Cartographer is a framework for condensing groupings of cloud events (e.g. Cl…☆164Updated 11 months ago
- The SOCless automation framework☆139Updated 2 months ago
- A collection of projects supporting AWS Integration☆155Updated 2 weeks ago
- Python installable command line utiltity for mitigation of host and key compromises.☆345Updated 3 years ago
- Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by devel…☆600Updated 3 weeks ago
- The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders…☆143Updated 7 months ago
- A MITRE ATT&CK Navigator export for AWS GuardDuty Findings☆137Updated 3 years ago
- Production-ready detection & response queries for osquery☆561Updated 3 weeks ago
- A framework for developing alerting and detection strategies for incident response.☆730Updated 3 years ago
- This content is analysis and research of the data sources currently listed in ATT&CK.☆409Updated last year
- Automated Attack Simulation in the Cloud, complete with detection use cases.☆560Updated 4 months ago
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆176Updated 7 months ago
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆186Updated 7 months ago
- Documenting your Threat Models with HCL☆426Updated 7 months ago
- A tool for AWS incident response, that allows for enumeration, acquisition and analysis of data from AWS environments for the purpose of …☆187Updated 6 months ago
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.☆276Updated 7 months ago
- An open project to list all publicly known cloud vulnerabilities and CSP security issues☆336Updated 2 weeks ago
- Command line tool for working with Panther rules and policies☆39Updated this week