☁️ ⚡ Granular, Actionable Adversary Emulation for the Cloud
- Updated
Oct 2, 2025 - Go
☁️ ⚡ Granular, Actionable Adversary Emulation for the Cloud
Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, and Benchmarks.
Pipelined Query Language
A flexible threat detection platform that simplifies rule management and deployment using K8s CronJob and Helm, but can also run standalone or with other job schedulers like Nomad.
Threatest is a CLI and Go framework for end-to-end testing threat detection rules.
Generate datasets of cloud audit logs for common attacks
Signature engine for all your logs
A public repository of quality research on cyber attack techniques. This is the backend for the Technique Research Report (TRR) Library.
Add a description, image, and links to the detection-engineering topic page so that developers can more easily learn about it.
To associate your repository with the detection-engineering topic, visit your repo's landing page and select "manage topics."