Unlocking Serverless Computing to Assess Security Controls
☆262Mar 15, 2024Updated 2 years ago
Alternatives and similar repositories for Cloud-Katana
Users that are interested in Cloud-Katana are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆69Oct 6, 2021Updated 4 years ago
- ☆44Aug 3, 2021Updated 4 years ago
- Cloud Security Operations Orchestrator☆189Apr 17, 2024Updated 2 years ago
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆75Oct 30, 2023Updated 2 years ago
- Understand adversary tradecraft and improve detection strategies☆715Mar 9, 2023Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Emulate and Dissect MSF and *other* attacks☆143Feb 28, 2024Updated 2 years ago
- Azure Red Team tool for graphing Azure and Azure Active Directory objects☆1,701Jan 8, 2024Updated 2 years ago
- Phishing Framework for Pentesters☆203May 16, 2023Updated 2 years ago
- High speed/Low cost CommonCrawl RegExp in Node.js☆257Apr 6, 2024Updated 2 years ago
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆201Aug 29, 2024Updated last year
- A collection of scripts for assessing Microsoft Azure security☆2,374Mar 15, 2026Updated last month
- Microsoft Sentinel2Go is an open source project developed to expedite the deployment of a Microsoft Sentinel research lab.☆593Jan 22, 2025Updated last year
- A Cloud Forensics Powershell module to run threat hunting playbooks on data from Azure and O365☆789Oct 29, 2022Updated 3 years ago
- PurpleSharp is a C# adversary simulation tool that executes adversary techniques with the purpose of generating attack telemetry in monit…☆845Feb 23, 2026Updated 2 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- An open-source, real-time Security Information & Event Management tool based on big data technologies, providing a scalable, advanced sec…☆209Apr 3, 2025Updated last year
- Zero Infrastructure Password Cracking☆418Aug 22, 2024Updated last year
- A Blazing fast Security Auditing tool for Kubernetes☆1,005Apr 6, 2024Updated 2 years ago
- ☆615Jun 1, 2023Updated 2 years ago
- Lateral Movement graph for Azure Active Directory☆127Dec 8, 2022Updated 3 years ago
- PowerShell framework to assess Azure security☆1,272Oct 18, 2025Updated 6 months ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Sep 22, 2021Updated 4 years ago
- Solitude is a privacy analysis tool that enables anyone to conduct their own privacy investigations. Whether a curious novice or a more a…☆374Apr 20, 2021Updated 5 years ago
- ☆647Jun 6, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Azure Outlook Command & Control (C2) - Remotely control a compromised Windows Device from your Outlook mailbox. Threat Emulation Tool for…☆504May 16, 2023Updated 2 years ago
- Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized en…☆1,219Feb 3, 2025Updated last year
- A little tool to play with Azure Identity - Azure and Entra ID lab creation tool. Blog: https://medium.com/@iknowjason/sentinel-for-pur…☆641Mar 21, 2025Updated last year
- Granular, Actionable Adversary Emulation for the Cloud☆2,304Updated this week
- Azure Security Resources and Notes☆1,741Feb 17, 2026Updated 2 months ago
- A collection of Azure AD/Entra tools for offensive and defensive security purposes☆2,598Feb 5, 2026Updated 3 months ago
- Building environments to replicate small networks and deploy applications☆333Jan 9, 2026Updated 3 months ago
- Expose a lot of MDE telemetry that is not easily accessible in any searchable form☆119Aug 19, 2025Updated 8 months ago
- BadZure automates the deployment of intentionally misconfigured Entra ID tenants and Azure subscriptions, populating them with diverse en…☆507Mar 4, 2026Updated 2 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- MDATP☆455Jul 20, 2024Updated last year
- Repository for threat hunting and detection queries, etc. for Defender for Endpoint and Microsoft Sentinel in KQL(Kusto Query Language).☆812Jan 14, 2026Updated 3 months ago
- Blue Pigeon is a Bluetooth-based data exfiltration and proxy tool to enable communication between a remote Command and Control (C2) serve…☆55Jul 31, 2021Updated 4 years ago
- Rapidly apply hundreds of security controls in Azure☆183May 1, 2025Updated last year
- Enumerate Domain Data☆335Sep 13, 2023Updated 2 years ago
- An Office365 User Attack Tool☆653Mar 19, 2024Updated 2 years ago
- This publication is a collection of various common attack scenarios on Microsoft Entra ID (formerly known as Azure Active Directory) and …☆2,514Apr 20, 2026Updated 2 weeks ago