vectra-ai-research / derfView external linksLinks
DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation of repeatable detection samples in the cloud. Built on Google Workflows
☆101Jan 12, 2024Updated 2 years ago
Alternatives and similar repositories for derf
Users that are interested in derf are comparing it to the libraries listed below
Sorting:
- Tool for obfuscating and deobfuscating data.☆75Mar 20, 2024Updated last year
- ☆65May 21, 2024Updated last year
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆173Jan 30, 2026Updated 2 weeks ago
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.☆293Sep 4, 2024Updated last year
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆338Updated this week
- Whois for the Cloud: Recon tool for cloud provider attribution. Supports AWS, Azure, Google, Cloudflare, and Digital Ocean.☆183Oct 9, 2025Updated 4 months ago
- ☆169Sep 30, 2025Updated 4 months ago
- cloudgrep is grep for cloud storage☆326Feb 26, 2025Updated 11 months ago
- Repository to archive GCP Documentation for local use☆16Feb 11, 2025Updated last year
- A small security playground implementation of GHOSTS User Simulation framework with an Active Directory deployment and Elastic.☆20Jul 17, 2024Updated last year
- Azure Activity Log Axe is a continually developing tool that simplifies the transactional log format provided by Microsoft. The tool leve…☆35Sep 6, 2024Updated last year
- ☆228Jan 29, 2026Updated 2 weeks ago
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆172Feb 8, 2026Updated last week
- Convert cloudtrail data to MITRE ATT&CK Sightings☆82Jul 25, 2022Updated 3 years ago
- Create your own vulnerable by design AWS penetration testing playground☆433Updated this week
- CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known…☆265Nov 21, 2025Updated 2 months ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆88Jan 28, 2024Updated 2 years ago
- An automated Adversary Emulation lab with terraform and MCP server. Build Caldera techniques and operations assisted with LLMs. Built f…☆205Nov 23, 2025Updated 2 months ago
- ☆30Jan 13, 2026Updated last month
- Scan your account for the use of untrusted AMIs☆31Updated this week
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆289Feb 5, 2024Updated 2 years ago
- Privateer is a plugin-based framework to validate the status of deployed resources.☆17Feb 5, 2026Updated last week
- ☆18Jan 31, 2025Updated last year
- ☆14Jan 8, 2026Updated last month
- Random scripts for azure stuff☆13Oct 12, 2022Updated 3 years ago
- Harness the security superpowers of your cloud asset inventory☆11Sep 22, 2024Updated last year
- Compares and analyzes GCP IAM roles.☆78Mar 9, 2025Updated 11 months ago
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securit…☆37Oct 17, 2024Updated last year
- Threat model for Amazon S3 - Library of all the attack scenarios on Amazon S3, and how to mitigate them following a risk-based approach☆157Oct 2, 2023Updated 2 years ago
- ☆116Updated this week
- JXA situational awareness helper by simply reading specific files on a filesystem☆82Feb 18, 2022Updated 3 years ago
- ☆124May 26, 2025Updated 8 months ago
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆282Nov 27, 2025Updated 2 months ago
- Python library to carry out DFIR analysis on the Cloud☆499Oct 8, 2025Updated 4 months ago
- BadZure automates the deployment of intentionally misconfigured Entra ID tenants and Azure subscriptions, populating them with diverse en…☆485Updated this week
- Crowdsourced list of sensitive IAM Actions☆159Oct 29, 2024Updated last year
- An AWS IAM policy statement parser and query tool.☆197Updated this week
- ☆39Aug 2, 2024Updated last year
- ☆46Nov 7, 2024Updated last year