BlaineConnaughton's Stars
clong/DetectionLab
Automate the creation of a lab environment complete with security tooling and logging best practices
san089/goodreads_etl_pipeline
An end-to-end GoodReads Data Pipeline for Building Data Lake, Data Warehouse and Analytics Platform.
product-security-group/Security_Ladders
Open source security career ladders
slackhq/go-audit
go-audit is an alternative to the auditd daemon that ships with many distros
p8952/bocker
Docker implemented in around 100 lines of bash
marco-lancini/cartography-queries
Utilities for programmatic analysis of Cartography data.
Cyb3rWard0g/HELK
The Hunting ELK
Netflix-Skunkworks/riskquant
xairy/unlockdown
Disabling kernel lockdown on Ubuntu without physical access
cartography-cncf/cartography
Cartography is a Python tool that consolidates infrastructure assets and the relationships between them in an intuitive graph view powered by a Neo4j database.
13o-bbr-bbq/machine_learning_security
Source code about machine learning and security.
rshipp/awesome-malware-analysis
Defund the Police.
bfuzzy/auditd-attack
A Linux Auditd rule set mapped to MITRE's Attack Framework
salesforce/policy_sentry
IAM Least Privilege Policy Generator
randsleadershipslack/employer-test
threatstack/trashtaxi
Keeping your infrastructure clean since 2018
RhinoSecurityLabs/AWS-IAM-Privilege-Escalation
A centralized source of all AWS IAM privilege escalation methods released by Rhino Security Labs.
Neo23x0/auditd
Best Practice Auditd Configuration
BishopFox/sliver
Adversary Emulation Framework
Shopify/krane
A command-line tool that helps you ship changes to a Kubernetes namespace and understand the result
Netflix/bless
Repository for BLESS, an SSH Certificate Authority that runs as a AWS Lambda function
dropbox/vsmc
Vendor Security Model Contract
kelseyhightower/kubernetes-the-hard-way
Bootstrap Kubernetes the hard way. No scripts.
trimstray/the-practical-linux-hardening-guide
This guide details creating a secure Linux production system. OpenSCAP (C2S/CIS, STIG).
mewmew/dissection
The dissection of a simple "hello world" ELF binary.
michalmalik/linux-re-101
A collection of resources for linux reverse engineering
quarantyne/quarantyne
Modern Web Firewall: stop account takeovers, weak passwords, cloud IPs, DoS attacks, disposable emails
RhinoSecurityLabs/cloudgoat
CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool
ossec/ossec-hids
OSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response.
almandin/fuxploider
File upload vulnerability scanner and exploitation tool.