DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation of repeatable detection samples in the cloud. Built on Google Workflows
☆101Jan 12, 2024Updated 2 years ago
Alternatives and similar repositories for derf
Users that are interested in derf are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆65May 21, 2024Updated last year
- Repository to archive GCP Documentation for local use☆16Feb 11, 2025Updated last year
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.☆293Sep 4, 2024Updated last year
- Tool for obfuscating and deobfuscating data.☆77Mar 20, 2024Updated 2 years ago
- Whois for the Cloud: Recon tool for cloud provider attribution. Supports AWS, Azure, Google, Cloudflare, and Digital Ocean.☆183Oct 9, 2025Updated 5 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆169Sep 30, 2025Updated 6 months ago
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆341Mar 22, 2026Updated last week
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆11Dec 20, 2021Updated 4 years ago
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆174Mar 2, 2026Updated 3 weeks ago
- cloudgrep is grep for cloud storage☆326Mar 14, 2026Updated 2 weeks ago
- A small security playground implementation of GHOSTS User Simulation framework with an Active Directory deployment and Elastic.☆20Jul 17, 2024Updated last year
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆174Mar 11, 2026Updated 2 weeks ago
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securit…☆37Oct 17, 2024Updated last year
- This repository provides a comprehensive collection of Pulumi scenarios utilized by cnappgoat☆22Jan 28, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆291Feb 5, 2024Updated 2 years ago
- Convert cloudtrail data to MITRE ATT&CK Sightings☆82Jul 25, 2022Updated 3 years ago
- An automated Adversary Emulation lab with terraform and MCP server. Build Caldera techniques and operations assisted with LLMs. Built f…☆205Nov 23, 2025Updated 4 months ago
- Cross cloud workload identity research and workshops☆49Mar 5, 2026Updated 3 weeks ago
- Create your own vulnerable by design AWS penetration testing playground☆438Feb 16, 2026Updated last month
- Compares and analyzes GCP IAM roles.☆79Mar 9, 2025Updated last year
- ☆40Aug 2, 2024Updated last year
- ☆229Mar 10, 2026Updated 2 weeks ago
- source code for the offsecml framework☆45Jun 6, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆89Jan 28, 2024Updated 2 years ago
- Playing around with Stratus Red Team (Cloud Attack simulation tool) and SumoLogic☆307Jan 6, 2023Updated 3 years ago
- Harness the security superpowers of your cloud asset inventory☆11Sep 22, 2024Updated last year
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆59Sep 20, 2023Updated 2 years ago
- Granular, Actionable Adversary Emulation for the Cloud☆2,286Updated this week
- Deliberately vulnerable AWS resources for security assessment demos☆32Aug 20, 2022Updated 3 years ago
- Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation o…☆1,159Dec 19, 2025Updated 3 months ago
- A little tool to play with Azure Identity - Azure and Entra ID lab creation tool. Blog: https://medium.com/@iknowjason/sentinel-for-pur…☆631Mar 21, 2025Updated last year
- ☆83Dec 5, 2019Updated 6 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆55Apr 25, 2023Updated 2 years ago
- ☆117Feb 11, 2026Updated last month
- Python library to carry out DFIR analysis on the Cloud☆502Mar 18, 2026Updated last week
- Asset inventory of over 800 public bug bounty programs.☆12Jun 12, 2023Updated 2 years ago
- Threat model for Amazon S3 - Library of all the attack scenarios on Amazon S3, and how to mitigate them following a risk-based approach☆157Mar 20, 2026Updated last week
- find dangling domains in a multi cloud environment☆176Dec 25, 2025Updated 3 months ago
- ☆75Mar 19, 2025Updated last year