Audit log wall of shame.
☆42Aug 20, 2025Updated 7 months ago
Alternatives and similar repositories for audit-log-wall-of-shame
Users that are interested in audit-log-wall-of-shame are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A guide to simplify the process of evaluating Datadog's Cloud SIEM security capabilities to detect AWS threats.☆20Jul 24, 2023Updated 2 years ago
- Knowledge Report Alert & Normalization Generator☆26Feb 11, 2026Updated 2 months ago
- Slack bot which promotes Defense in Depth/Zero Trust security practices☆24Jan 17, 2023Updated 3 years ago
- Modron - Cloud security compliance☆34Dec 11, 2024Updated last year
- Substation is a toolkit for routing, normalizing, and enriching security event and audit logs.☆395Jan 20, 2026Updated 2 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆15Sep 26, 2022Updated 3 years ago
- Command line tool for working with Panther rules and policies☆48Apr 10, 2026Updated last week
- ☆83Dec 5, 2019Updated 6 years ago
- A tool for interacting with live processes/containers☆22Sep 21, 2022Updated 3 years ago
- A Zeek package that detects Zoom logins and meeting joins☆12Apr 15, 2020Updated 6 years ago
- ☆14Jun 20, 2022Updated 3 years ago
- Just a quick and dirty tool I created to automate some of my standard recon/enumeration activities when doing CTFs☆13Mar 10, 2021Updated 5 years ago
- Low budget VirusTotal Intelligence Cosplay☆20Jan 6, 2022Updated 4 years ago
- A Rust library for parsing npm's `package.json` file.☆14Aug 16, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Tool for obfuscating and deobfuscating data.☆77Mar 20, 2024Updated 2 years ago
- defendA Data Lake. A firehose pipeline to athena providing enrichment and normalization for security events☆17Mar 19, 2026Updated last month
- Returns a list of all Public IP addresses being used by your AWS account. You can configure which regions you want to query.☆14Jun 7, 2020Updated 5 years ago
- Centralizing AWS CloudWatch log forwarding via EventBridge and Step Functions☆48Feb 12, 2023Updated 3 years ago
- List of vendors that do not allow IMDSv2 enforcement☆143May 3, 2024Updated last year
- A Software as a Service (SaaS) log collection framework.☆186Updated this week
- Uptane, security framework for automotive updates☆11Mar 29, 2019Updated 7 years ago
- A framework and taxonomy for identifying, classifying, and reasoning about detection logic bugs in SIEM, EDR, and XDR rules, with concret…☆48Mar 5, 2026Updated last month
- Repository to archive GCP Documentation for local use☆16Feb 11, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- How to hydrate Kinesis DLQs records☆13Dec 11, 2023Updated 2 years ago
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securit…☆37Oct 17, 2024Updated last year
- CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known…☆266Nov 21, 2025Updated 4 months ago
- A CLI tool for managing Chronicle user workflows☆18Sep 24, 2025Updated 6 months ago
- A minimalist risk management program!☆151Aug 10, 2022Updated 3 years ago
- Java implementation for performing operations on Apache Iceberg and Hive tables☆20Sep 17, 2025Updated 7 months ago
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆291Feb 5, 2024Updated 2 years ago
- Create Logstash events from the Okta API!☆19Nov 29, 2022Updated 3 years ago
- Use Markov Chains to obfuscate data as other data☆54Aug 3, 2016Updated 9 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆18Feb 2, 2026Updated 2 months ago
- ☆21Jan 28, 2026Updated 2 months ago
- Tom's Honey Pot as seen in Applied Network Security Monitoring.☆26Apr 27, 2015Updated 10 years ago
- Released at Black Hat Asia on April 18, 2024, Cloud Console Cartographer is a framework for condensing groupings of cloud events (e.g. Cl…☆173May 16, 2024Updated last year
- ☆99Sep 16, 2022Updated 3 years ago
- A standard for reducing log volume without sacrificing analytical capability☆216Feb 21, 2025Updated last year
- This is the code repository for **Prompting Client**☆16Apr 8, 2026Updated last week