threat-punter / detection-as-code-example
A POC to implement Detection-as-Code with Terraform and Sumo Logic.
☆25Updated last year
Alternatives and similar repositories for detection-as-code-example:
Users that are interested in detection-as-code-example are comparing it to the libraries listed below
- ☆65Updated 9 months ago
- pocket guide for core detection engineering concepts☆27Updated last year
- ☆18Updated 3 years ago
- Anvilogic Forge☆93Updated this week
- Open Threat-Informed Detection Engineering☆37Updated last month
- A tool that allows you to document and assess any security automation in your SOC☆45Updated 3 months ago
- ☆40Updated last month
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.☆27Updated last year
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆91Updated last year
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆35Updated this week
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆52Updated last year
- A cheatsheet containing AWS CloudTrail events that can be used for Incident Response purposes or Detection Engineering.☆67Updated 9 months ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆51Updated 2 years ago
- Attack Range to test detection against nativel serverless cloud services and environments☆35Updated 3 years ago
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆65Updated 11 months ago
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆156Updated this week
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆78Updated last year
- The Event Maturity Matrix (EMM) is a comprehensive framework that provides clarity regarding the capabilities and nuances of SaaS audit l…☆19Updated 5 months ago
- ☆93Updated 2 years ago
- Knowledge Report Alert & Normalization Generator☆27Updated 11 months ago
- ☆26Updated 3 months ago
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆48Updated 3 months ago
- Azure Activity Log Axe is a continually developing tool that simplifies the transactional log format provided by Microsoft. The tool leve…☆26Updated 5 months ago
- ☆37Updated 2 months ago
- Recon Hunt Queries☆76Updated 3 years ago
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆140Updated this week
- The idea is simply to save some quick notes that will make it easier for Splunk users to leverage KQL (Kusto), especially giving projects…☆39Updated 4 years ago
- SigmaHQ pySigma CrowdStrike processing pipeline☆23Updated 4 months ago
- Public release of Whalehoney Honeypot☆29Updated 2 years ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆67Updated this week