☁️ ⚡ Granular, Actionable Adversary Emulation for the Cloud
-
Updated
Mar 1, 2025 - Go
☁️ ⚡ Granular, Actionable Adversary Emulation for the Cloud
Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, and Benchmarks.
Pipelined Query Language
A flexible threat detection platform that simplifies rule management and deployment using K8s CronJob and Helm, but can also run standalone or with other job schedulers like Nomad.
Threatest is a CLI and Go framework for end-to-end testing threat detection rules.
Generate datasets of cloud audit logs for common attacks
Signature engine for all your logs
Add a description, image, and links to the detection-engineering topic page so that developers can more easily learn about it.
To associate your repository with the detection-engineering topic, visit your repo's landing page and select "manage topics."