Elevated-Standards / proof-of-concept-cloud-evidence-collectionLinks
Point of Concept: To help to automate the collection of evidence for SOC 2 Audits and etc.
☆11Updated last year
Alternatives and similar repositories for proof-of-concept-cloud-evidence-collection
Users that are interested in proof-of-concept-cloud-evidence-collection are comparing it to the libraries listed below
Sorting:
- An ongoing collection of of AWS tools, frameworks, libraries, learning tutorials for InfoSec and security professionals☆23Updated 4 years ago
- ATHI — An AI Threat Modeling Framework for Policymakers☆59Updated 2 years ago
- A collection of awesome tools, software, libraries, learning tutorials & videos, frameworks, best practices and technical resources abou…☆61Updated 3 years ago
- Short deep dive into Threat Hunting on AWS☆17Updated 2 years ago
- 🤖 A GitHub action that leverages fabric patterns through an agent-based approach☆34Updated last year
- MetaHub is an automated contextual security findings enrichment and impact evaluation tool for vulnerability management.☆176Updated last month
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆24Updated 11 months ago
- A fun POC that is built to understand AI security agents.☆34Updated 3 months ago
- A meta-database collecting resources that compile lists of breaches☆21Updated 3 months ago
- AISA-Scanner is an AI-powered autonomous vulnerability scanner that maps CVEs to metasploit exploits, MITRE, CEH, and SANS, delivering in…☆31Updated 6 months ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆73Updated last year
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆34Updated 3 years ago
- Workflows for Shuffle☆24Updated 3 years ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆68Updated 7 months ago
- ☆30Updated 2 weeks ago
- A catalog of services that can be publicly exposed within different cloud providers.☆14Updated last year
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆55Updated last month
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆117Updated 3 weeks ago
- Collection of mine and others presentations on various topics like application security, python, cloud security, DevSecOps and so on... T…☆42Updated 10 months ago
- AWSATT&CK adds MITRE ATT&CK context and additional logging capabilities to Rhino Security Labs's open-source AWS exploitation framework, …☆45Updated 4 years ago
- SANS has developed a set of information security policy templates. These are free to use and fully customizable to your company's IT secu…☆52Updated 4 years ago
- Maturity Model Collaborative project☆15Updated 2 years ago
- ☆20Updated 9 months ago
- HoneyAgents is a PoC demo of an AI-driven system that combines honeypots with autonomous AI agents to detect and mitigate cyber threats. …☆59Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆68Updated 6 months ago
- All of our GitHub Actions rolled into one. Or as we like to say: One GitHub Action to rule them all!☆21Updated 2 years ago
- A SOC Analyst's tool to automate the investigation & validation of possible Indicators of Compromise (IOCs) and perform various tasks inc…☆29Updated 3 years ago
- https://breaches.cloud☆42Updated last year
- The official Prelude SIEM GitHub of https://www.prelude-siem.org☆35Updated 9 years ago
- Automate Checkmarx Scanning and Onboarding Plus AWS Access☆12Updated 3 years ago