Audit log wall of shame.
☆42Aug 20, 2025Updated 8 months ago
Alternatives and similar repositories for audit-log-wall-of-shame
Users that are interested in audit-log-wall-of-shame are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Knowledge Report Alert & Normalization Generator☆26Apr 23, 2026Updated 2 weeks ago
- Slack bot which promotes Defense in Depth/Zero Trust security practices☆25Jan 17, 2023Updated 3 years ago
- Modron - Cloud security compliance☆34Dec 11, 2024Updated last year
- The Jolly Executioner - a simple command execution proxy☆16Jun 9, 2024Updated last year
- Command line tool for working with Panther rules and policies☆48Apr 30, 2026Updated last week
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆83Dec 5, 2019Updated 6 years ago
- A tool for interacting with live processes/containers☆22Sep 21, 2022Updated 3 years ago
- ☆14Jul 21, 2024Updated last year
- A Zeek package that detects Zoom logins and meeting joins☆12Apr 15, 2020Updated 6 years ago
- ☆14Jun 20, 2022Updated 3 years ago
- Low budget VirusTotal Intelligence Cosplay☆20Jan 6, 2022Updated 4 years ago
- Tool for obfuscating and deobfuscating data.☆77Mar 20, 2024Updated 2 years ago
- a common schema for internet-connected service discovery☆23Mar 24, 2026Updated last month
- defendA Data Lake. A firehose pipeline to athena providing enrichment and normalization for security events☆17Mar 19, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Returns a list of all Public IP addresses being used by your AWS account. You can configure which regions you want to query.☆14Jun 7, 2020Updated 5 years ago
- small IR scripts for orgs using G Suite☆18Feb 27, 2019Updated 7 years ago
- Centralizing AWS CloudWatch log forwarding via EventBridge and Step Functions☆48Feb 12, 2023Updated 3 years ago
- List of vendors that do not allow IMDSv2 enforcement☆143May 3, 2024Updated 2 years ago
- A Software as a Service (SaaS) log collection framework.☆186Apr 13, 2026Updated 3 weeks ago
- Uptane, security framework for automotive updates☆11Mar 29, 2019Updated 7 years ago
- A framework and taxonomy for identifying, classifying, and reasoning about detection logic bugs in SIEM, EDR, and XDR rules, with concret…☆49Mar 5, 2026Updated 2 months ago
- Repository to archive GCP Documentation for local use☆16Feb 11, 2025Updated last year
- How to hydrate Kinesis DLQs records☆13Dec 11, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Automated deployment of MISP and MISP-Dashboard via K8S and AWS☆19Dec 9, 2019Updated 6 years ago
- CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known…☆266Nov 21, 2025Updated 5 months ago
- A CLI tool for managing Chronicle user workflows☆18Apr 13, 2026Updated 3 weeks ago
- A minimalist risk management program!☆152Aug 10, 2022Updated 3 years ago
- Runs Kubesec as GitHub action☆21Apr 21, 2021Updated 5 years ago
- Generate IaC scripts from existing AWS resources with temporary security credentials☆29Jan 5, 2026Updated 4 months ago
- A set of manifests that can be used to build variants of PELUX☆12Mar 30, 2021Updated 5 years ago
- Java implementation for performing operations on Apache Iceberg and Hive tables