shellcromancer / audit-log-wall-of-shameView external linksLinks
Audit log wall of shame.
☆42Aug 20, 2025Updated 5 months ago
Alternatives and similar repositories for audit-log-wall-of-shame
Users that are interested in audit-log-wall-of-shame are comparing it to the libraries listed below
Sorting:
- Modron - Cloud security compliance☆34Dec 11, 2024Updated last year
- Knowledge Report Alert & Normalization Generator☆26Updated this week
- Slack bot which promotes Defense in Depth/Zero Trust security practices☆24Jan 17, 2023Updated 3 years ago
- ☆83Dec 5, 2019Updated 6 years ago
- A Zeek package that detects Zoom logins and meeting joins☆12Apr 15, 2020Updated 5 years ago
- ☆14Jun 20, 2022Updated 3 years ago
- The Jolly Executioner - a simple command execution proxy☆16Jun 9, 2024Updated last year
- How to hydrate Kinesis DLQs records☆13Dec 11, 2023Updated 2 years ago
- Repository to archive GCP Documentation for local use☆16Feb 11, 2025Updated last year
- defendA Data Lake. A firehose pipeline to athena providing enrichment and normalization for security events☆17Apr 19, 2023Updated 2 years ago
- A guide to simplify the process of evaluating Datadog's Cloud SIEM security capabilities to detect AWS threats.☆19Jul 24, 2023Updated 2 years ago
- Tool for obfuscating and deobfuscating data.☆75Mar 20, 2024Updated last year
- Command line tool for working with Panther rules and policies☆48Updated this week
- Java implementation for performing operations on Apache Iceberg and Hive tables☆19Sep 17, 2025Updated 5 months ago
- A tool for interacting with live processes/containers☆22Sep 21, 2022Updated 3 years ago
- Centralizing AWS CloudWatch log forwarding via EventBridge and Step Functions☆48Feb 12, 2023Updated 3 years ago
- Tom's Honey Pot as seen in Applied Network Security Monitoring.☆27Apr 27, 2015Updated 10 years ago
- Collect IAM information from all your AWS organization, accounts, and resources.☆85Updated this week
- Use Markov Chains to obfuscate data as other data☆54Aug 3, 2016Updated 9 years ago
- List of vendors that do not allow IMDSv2 enforcement☆143May 3, 2024Updated last year
- A Software as a Service (SaaS) log collection framework.☆182Jan 16, 2026Updated last month
- Generate IaC scripts from existing AWS resources with temporary security credentials☆29Jan 5, 2026Updated last month
- For use in our Tenable.IO to AWS Security Hub integration☆28Sep 4, 2025Updated 5 months ago
- CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known…☆265Nov 21, 2025Updated 2 months ago
- Compares and analyzes GCP IAM roles.☆78Mar 9, 2025Updated 11 months ago
- Xipher is a curated collection of cryptographic primitives put together to perform key/password based asymmetric encryption☆13Jan 6, 2026Updated last month
- ZAPISEC WAF-Copilot is an automated AI-powered security framework for web applications with a focus on highly configurable streamlined vu…☆21Oct 6, 2025Updated 4 months ago
- A minimalist risk management program!☆151Aug 10, 2022Updated 3 years ago
- HASH (HTTP Agnostic Software Honeypot)☆141Updated this week
- Grand Central logging for Cloud Services to Splunk☆36Jan 22, 2022Updated 4 years ago
- ☆228Jan 29, 2026Updated 2 weeks ago
- Goby CLI eBPF Project Generator☆34Feb 8, 2025Updated last year
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securit…☆37Oct 17, 2024Updated last year
- AWS docs, guides, and other tools☆75Feb 4, 2023Updated 3 years ago
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆97Updated this week
- OPI5 open micro desk design.☆13Mar 6, 2023Updated 2 years ago
- AWS VPC Subnets Watcher☆79Aug 23, 2023Updated 2 years ago
- ☆42Jul 23, 2025Updated 6 months ago
- A small script to automate project folder management and basic tool output☆34May 14, 2020Updated 5 years ago