aws-waf-loggerLog all AWS WAF Matched Rules to S3 and/or Loggly using Serverless
Stars: ✭ 18 (+12.5%)
Mutual labels: aws-security
PacuThe AWS exploitation framework, designed for testing the security of Amazon Web Services environments.
Stars: ✭ 2,451 (+15218.75%)
Mutual labels: aws-security
pycommunityidA Python implementation of the Community ID flow hashing standard
Stars: ✭ 18 (+12.5%)
Mutual labels: network-security-monitoring
cfngoatCfngoat is Bridgecrew's "Vulnerable by Design" Cloudformation repository. Cfngoat is a learning and training project that demonstrates how common configuration errors can find their way into production cloud environments.
Stars: ✭ 70 (+337.5%)
Mutual labels: aws-security
Security monkeySecurity Monkey monitors AWS, GCP, OpenStack, and GitHub orgs for assets and their changes over time.
Stars: ✭ 4,244 (+26425%)
Mutual labels: aws-security
community-id-specAn open standard for hashing network flows into identifiers, a.k.a "Community IDs".
Stars: ✭ 137 (+756.25%)
Mutual labels: network-security-monitoring
sandcastle🏰 A Python script for AWS S3 bucket enumeration.
Stars: ✭ 53 (+231.25%)
Mutual labels: aws-security
JxnetJxnet is a Java library for capturing and sending custom network packet buffers with no copies. Jxnet wraps a native packet capture library (libpcap/winpcap/npcap) via JNI (Java Native Interface).
Stars: ✭ 26 (+62.5%)
Mutual labels: network-security-monitoring
TerrascanDetect compliance and security violations across Infrastructure as Code to mitigate risk before provisioning cloud native infrastructure.
Stars: ✭ 2,687 (+16693.75%)
Mutual labels: aws-security
Zeek-Network-Security-MonitorA Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the necessary hardware and setup and finally provide some examples of how you can use the power of Zeek to have absolute control over your network.
Stars: ✭ 38 (+137.5%)
Mutual labels: network-security-monitoring
awesome-cloud-security🛡️ Awesome Cloud Security Resources ⚔️
Stars: ✭ 1,056 (+6500%)
Mutual labels: aws-security
SyntheticSunSyntheticSun is a defense-in-depth security automation and monitoring framework which utilizes threat intelligence, machine learning, managed AWS security services and, serverless technologies to continuously prevent, detect and respond to threats.
Stars: ✭ 49 (+206.25%)
Mutual labels: aws-security
testmynids.orgA website and framework for testing NIDS detection
Stars: ✭ 55 (+243.75%)
Mutual labels: network-security-monitoring
cdkgoatCdkGoat is Bridgecrew's "Vulnerable by Design" AWS CDK repository. CdkGoat is a learning and training project that demonstrates how common configuration errors can find their way into production cloud environments.
Stars: ✭ 27 (+68.75%)
Mutual labels: aws-security
Security OnionSecurity Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management
Stars: ✭ 2,956 (+18375%)
Mutual labels: network-security-monitoring
GDPatrolA Lambda-powered Security Orchestration framework for AWS GuardDuty
Stars: ✭ 50 (+212.5%)
Mutual labels: aws-security
CheckovPrevent cloud misconfigurations during build-time for Terraform, Cloudformation, Kubernetes, Serverless framework and other infrastructure-as-code-languages with Checkov by Bridgecrew.
Stars: ✭ 3,572 (+22225%)
Mutual labels: aws-security
introspectorA schema and set of tools for using SQL to query cloud infrastructure.
Stars: ✭ 61 (+281.25%)
Mutual labels: aws-security
CloudFrontierMonitor the internet attack surface of various public cloud environments. Currently supports AWS, GCP, Azure, DigitalOcean and Oracle Cloud.
Stars: ✭ 102 (+537.5%)
Mutual labels: aws-security
nsm-attackMapping NSM rules to MITRE ATT&CK
Stars: ✭ 53 (+231.25%)
Mutual labels: network-security-monitoring