Defenders think in lists. Attackers think in graphs. So attackers win

This page summarizes the projects mentioned and recommended in the original post on news.ycombinator.com

CodeRabbit: AI Code Reviews for Developers
Revolutionize your code reviews with AI. CodeRabbit offers PR summaries, code walkthroughs, 1-click suggestions, and AST-based analysis. Boost productivity and code quality across all major languages with each PR.
coderabbit.ai
featured
Nutrient – The #1 PDF SDK Library, trusted by 10K+ developers
Other PDF SDKs promise a lot - then break. Laggy scrolling, poor mobile UX, tons of bugs, and lack of support cost you endless frustrations. Nutrient’s SDK handles billion-page workloads - so you don’t have to debug PDFs. Used by ~1 billion end users in more than 150 different countries.
www.nutrient.io
featured
  1. Shared

    Shared Blogs and Notebooks (by JohnLaTwC)

  2. CodeRabbit

    CodeRabbit: AI Code Reviews for Developers. Revolutionize your code reviews with AI. CodeRabbit offers PR summaries, code walkthroughs, 1-click suggestions, and AST-based analysis. Boost productivity and code quality across all major languages with each PR.

    CodeRabbit logo
  3. BloodHound-Legacy

    Six Degrees of Domain Admin

    Defenders also think in graphs. Matter of fact, good defenders think like attackers.

    Case in point, to contradict the author of this post directly:

    https://github.com/BloodHoundAD/BloodHound

    BloodHound is primarily a defender tool, that uses graph theory to help defenders find attack paths. But attackers also use it to help them find the shortest path to owning an AD domain. BloodHound is used in by a lot of threat actors as part of those news stories where the entire company is ransomwared. But what you don't see is, in a lot of companies that don't get totally ransomwared, there is a chance defenders are also using BloodHound to find and fix attack paths.

  4. fixinventory

    Fix Inventory helps you identify and remove the most critical risks in AWS, GCP, Azure and Kubernetes.

    There is also Fix Inventory, which is a graph-based security tool:

    https://github.com/someengineering/fixinventory

    I'm one of the people behind Fix Inventory. What scares a lot of developers away from graph-based tools is the graph query language. It has a steep learning curve, and unless you write queries every day, it's really cumbersome to learn.

    We simplified that with our own search syntax that has all the benefits of the graph, but simplified a few concepts like graph traversal.

NOTE: The number of mentions on this list indicates mentions on common posts plus user suggested alternatives. Hence, a higher number means a more popular project.

Suggest a related project

Related posts

  • Invoice granularity: Show different accounts/cost allocation tags on invoice

    1 project | /r/aws | 11 Apr 2023
  • Resoto | Graph-based Cloud Asset Inventory

    1 project | /r/u_Current_Doubt_8584 | 8 Apr 2023
  • How much does Discovery really cost?

    1 project | /r/servicenow | 17 Feb 2023
  • Forming an MSP - some questions

    1 project | /r/msp | 25 Jan 2023
  • someengineering/cloud2sql - Read infrastructure data from your cloud and export it to a SQL database.

    3 projects | /r/coolgithubprojects | 19 Jan 2023

Did you know that PowerShell is
the 40th most popular programming language
based on number of references?