DuneGroup / ice-axe
☆23Updated 4 months ago
Alternatives and similar repositories for ice-axe:
Users that are interested in ice-axe are comparing it to the libraries listed below
- A PoC to Simulate Ransomware Attack on AWS Environment☆29Updated 3 months ago
- ☆32Updated 5 months ago
- ☆31Updated 2 months ago
- The Event Maturity Matrix (EMM) is a comprehensive framework that provides clarity regarding the capabilities and nuances of SaaS audit l…☆18Updated 5 months ago
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆47Updated 2 months ago
- ☆39Updated 2 weeks ago
- Tool for obfuscating and deobfuscating data.☆67Updated 10 months ago
- ☆65Updated 8 months ago
- An open source Wireshark extcap to make ad hoc mirroring of AWS EC2 traffic easier☆16Updated last month
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆25Updated this week
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆60Updated last year
- ☆26Updated 2 months ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆58Updated last year
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.☆27Updated last year
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆16Updated 7 months ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆32Updated last month
- Knowledge Report Alert & Normalization Generator☆27Updated 10 months ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆63Updated this week
- This is a custom SSM agent which is sorta functional☆17Updated 3 years ago
- ☆12Updated 2 months ago
- Semgrep-based Policy Controller for Kubernetes☆45Updated this week
- ☆46Updated 3 months ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆55Updated 3 years ago
- AWS SSO serverless phishing API.☆31Updated 3 years ago
- Updated incident response generator for training classes☆42Updated 3 years ago
- pocket guide for core detection engineering concepts☆27Updated last year
- ☆41Updated 7 months ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Updated 3 years ago
- PII detection platform, leveraging human-in-the-loop AI☆49Updated 2 months ago
- Modron - Cloud security compliance☆33Updated last month