CloudSecurityPartners / hack-aws-in-60-minutes
☆11Updated 7 months ago
Related projects: ⓘ
- Generates runbooks for GuardDuty findings☆34Updated 2 months ago
- Convert cloudtrail data to MITRE ATT&CK Sightings☆77Updated 2 years ago
- Listing of resources for example AWS Service Control Policies (SCPs)☆15Updated 8 months ago
- ☆108Updated last month
- Compares and analyzes GCP IAM roles.☆76Updated 3 months ago
- Identify all permitted data paths originating from the Internet to Network Interfaces within AWS Accounts across the entire AWS Organizat…☆35Updated last year
- Deliberately vulnerable AWS resources for security assessment demos☆31Updated 2 years ago
- https://breaches.cloud☆36Updated 2 months ago
- ☆37Updated 8 months ago
- Public repository of all things cloud security.☆31Updated 3 weeks ago
- ☆82Updated 7 months ago
- Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).☆137Updated 6 months ago
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆29Updated 5 months ago
- An AWS IAM policy statement parser and query tool.☆153Updated 7 months ago
- Terraform provider for managing Wiz resources☆25Updated 2 weeks ago
- A cheatsheet containing AWS CloudTrail events that can be used for Incident Response purposes or Detection Engineering.☆58Updated 4 months ago
- ThreatModel for Amazon S3 - Library of all the attack scenarios on Amazon S3, and how to mitigate them following a risk-based approach☆148Updated 11 months ago
- The Amazon Elastic Kubernetes Service (EKS) Creation Engine (ECE) is a Python command-line program created by the Lightspin Office of the…☆40Updated last year
- A guide to simplify the process of evaluating Datadog's Cloud SIEM security capabilities to detect AWS threats.☆15Updated last year
- ☆66Updated 4 months ago
- AWS SSO Reporter☆54Updated last year
- This solutions facilitates rapid deployment of Prowler, full AWS Organization analysis, and finding processing as part of a security post…☆45Updated 3 weeks ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆55Updated last year
- Lightspin AWS IAM Vulnerability Scanner☆96Updated 3 years ago
- CdkGoat is Bridgecrew's "Vulnerable by Design" AWS CDK repository. CdkGoat is a learning and training project that demonstrates how commo…☆43Updated last year
- Crowdsourced list of sensitive IAM Actions☆132Updated last week
- A MITRE ATT&CK Navigator export for AWS GuardDuty Findings☆136Updated 3 years ago
- Scripts to quickly fix security and compliance issues☆25Updated 9 months ago
- Automated Forensics Orchestrator for Amazon EC2 is a self-service AWS Solution implementation that enterprise customers can deploy to qui…☆57Updated 2 weeks ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆82Updated 8 months ago