AyberkHalac / CloudPathSnifferLinks
CloudPathSniffer is an open-source, easy to use and extensible Cloud Anomaly Detection platform designed to help security teams to find hard to see risks and undetected attackers in their control plane of cloud environments.
☆13Updated last year
Alternatives and similar repositories for CloudPathSniffer
Users that are interested in CloudPathSniffer are comparing it to the libraries listed below
Sorting:
- ☆10Updated 3 years ago
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by use…☆72Updated 2 years ago
- A catalog of services that can be publicly exposed within different cloud providers.☆15Updated last year
- Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/)☆89Updated 2 years ago
- ☆45Updated 9 months ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14Updated 3 months ago
- Serverless honeytoken 🕵🏻♂️☆80Updated 2 years ago
- A MITRE Caldera plugin☆45Updated 9 months ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆29Updated 6 months ago
- ☆28Updated last week
- This application was built to help reduce the amount of time it takes to review AWS Lambda code.☆60Updated 9 months ago
- Simulates a compromise in a cloud and container environment☆32Updated 8 months ago
- ☆39Updated last year
- SecureMCP is a security auditing tool designed to detect vulnerabilities and misconfigurations in applications using the [Model Context P…☆124Updated 2 months ago
- A toolset to juggle AWS roles for persistent access☆58Updated last year
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆114Updated last month
- Based on Lightspin proprietary data, research, and our tracking of cloud security trends in the market, our research team has compiled a …☆40Updated 3 years ago
- WAF bypass PoC☆48Updated last year
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆52Updated 2 months ago
- Tool for obfuscating and deobfuscating data.☆72Updated last year
- A library of data visualization dashboard templates that can be imported into JupiterOne.☆18Updated last week
- Short deep dive into Threat Hunting on AWS☆13Updated last year
- IAM-Deescalate helps mitigate privilege escalation risk in AWS identity and access management (IAM)☆98Updated 2 years ago
- 🌐 Visualize and explore IaC ✒️ Create and share notes in VS Code 🤝 Sync notes and findings in real-time with friends☆74Updated last year
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆77Updated 2 years ago
- ☆30Updated 2 months ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Updated 3 years ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆109Updated 9 months ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆70Updated last year
- ☆74Updated 5 months ago