Command line tool for working with Panther rules and policies
☆48Feb 28, 2026Updated last week
Alternatives and similar repositories for panther_analysis_tool
Users that are interested in panther_analysis_tool are comparing it to the libraries listed below
Sorting:
- Built-in Panther detection rules and policies☆439Updated this week
- ☆18Sep 13, 2021Updated 4 years ago
- A POC to implement Detection-as-Code with Terraform and Sumo Logic.☆31Jul 27, 2023Updated 2 years ago
- Dispatch personnel and units from audio inputs, streams, files and more.☆16Dec 8, 2022Updated 3 years ago
- OpenCSPM Community Controls☆14May 18, 2021Updated 4 years ago
- A framework for parsing binary data.☆18Aug 12, 2022Updated 3 years ago
- AWS managed IAM policies☆16Mar 24, 2022Updated 3 years ago
- Audit log wall of shame.☆42Aug 20, 2025Updated 6 months ago
- This repository is used by FalconForce to release parts of the internal tools used for maintaining, validating and automatically deployin…☆17Mar 10, 2023Updated 2 years ago
- Ultimate Benchmark for Container Image Scanners☆13Oct 16, 2020Updated 5 years ago
- Creates needed resources for federating access between a GCP service account and AWS IAM role.☆29Apr 3, 2024Updated last year
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆55Jul 1, 2022Updated 3 years ago
- Collection of example YARA-L rules for use within Google Security Operations☆473Dec 5, 2025Updated 3 months ago
- Security, Compliance and Informational Dashboard System☆25May 12, 2021Updated 4 years ago
- Python script to automatically create sigma rules from The hive observables☆25Mar 17, 2019Updated 6 years ago
- ☆11Feb 9, 2023Updated 3 years ago
- pocket guide for core detection engineering concepts☆31May 8, 2023Updated 2 years ago
- A Ledger-backed Secure Key-Value store (LSKV), built on the Confidential Consortium Framework (CCF)☆38Feb 12, 2026Updated 3 weeks ago
- AWS docs, guides, and other tools☆75Feb 4, 2023Updated 3 years ago
- Xipher is a curated collection of cryptographic primitives put together to perform key/password based asymmetric encryption☆14Feb 21, 2026Updated last week
- ESP32 port of the existing TeslaBMS program☆10Jun 12, 2023Updated 2 years ago
- A Python library for connecting securely to your AlloyDB instances.☆37Feb 11, 2026Updated 3 weeks ago
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆338Feb 13, 2026Updated 3 weeks ago
- A Software as a Service (SaaS) log collection framework.☆183Jan 16, 2026Updated last month
- Substation is a toolkit for routing, normalizing, and enriching security event and audit logs.☆389Jan 20, 2026Updated last month
- Blazing fast, modular, next gen logagent☆11Feb 24, 2026Updated last week
- ☆12Updated this week
- Interact with standup reports and poll results directly from Claude or Cursor☆18Feb 25, 2026Updated last week
- Cryptocurrency tax and tracking tools for the Beancount platform.☆11Aug 23, 2024Updated last year
- ☆37Nov 9, 2025Updated 3 months ago
- OpenVPN Install Script☆13Dec 31, 2022Updated 3 years ago
- Deploy Backup and DR appliances☆12Feb 24, 2026Updated last week
- An SSH honeypot written entirely in Go.☆12Dec 4, 2025Updated 3 months ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- Python 3 script for analyzing Apama correlator log files and extracting useful diagnostic information☆13Jan 27, 2025Updated last year
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- Sigma Queries turned into KQL for Defender using pysigma☆12Jun 20, 2024Updated last year
- API server for interacting with decentralised identity functionality on the cheqd Network☆11Updated this week
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated 11 months ago