Tracker for Encryption by Default for AWS Resources
☆14Apr 10, 2025Updated 10 months ago
Alternatives and similar repositories for aws-encryption-tracker
Users that are interested in aws-encryption-tracker are comparing it to the libraries listed below
Sorting:
- A catalog of services that can be publicly exposed within different cloud providers.☆14Aug 30, 2024Updated last year
- Prowler Studio is an AI assistant that helps you to create threat detection checks, remediations and update compliance frameworks for Pro…☆47Feb 14, 2026Updated 2 weeks ago
- Safer AWS SCP deployments via real-time monitoring☆56Sep 30, 2023Updated 2 years ago
- Crowdsourced list of sensitive IAM Actions☆159Oct 29, 2024Updated last year
- Scripts to quickly fix security and compliance issues☆28Feb 9, 2026Updated 2 weeks ago
- Convert cloudtrail data to MITRE ATT&CK Sightings☆82Jul 25, 2022Updated 3 years ago
- Appollo is an open-source tool for continuous attack surface monitoring, helping organizations identify, analyze, and mitigate security r…☆43Feb 11, 2026Updated 2 weeks ago
- Xipher is a curated collection of cryptographic primitives put together to perform key/password based asymmetric encryption☆14Feb 21, 2026Updated last week
- Generates runbooks for GuardDuty findings☆38Jun 24, 2024Updated last year
- Finders Keypers: AWS KMS Encryption Key Usage and Blast Radius Finder☆45Aug 13, 2025Updated 6 months ago
- ☆11Sep 20, 2021Updated 4 years ago
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆174Feb 22, 2026Updated last week
- Abuse adapts to technology. You deserve privacy and compassion.☆13Mar 26, 2017Updated 8 years ago
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- Examples related to Amazon Lightsail☆12Jul 17, 2024Updated last year
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- Reverse IP Lookup Tool that allows you to use an IP address to identify all websites hosted on a server.☆10Jun 29, 2016Updated 9 years ago
- ☆374Feb 23, 2024Updated 2 years ago
- A public cloud security knowledgebase - https://www.secwiki.cloud/☆51Nov 12, 2024Updated last year
- ☆11Dec 26, 2023Updated 2 years ago
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- ☆11May 1, 2024Updated last year
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- Converts burp's sitemap to sulley's fuzzing script☆11Aug 30, 2015Updated 10 years ago
- Exploit Pack - One step ahead☆12Sep 9, 2013Updated 12 years ago
- Go(od) Job is a simple job scheduler that supports task retries, logging, and task sharding.☆12Sep 10, 2024Updated last year
- Visually analyze basic block code coverage in Binary Ninja using Pin output.☆11Oct 6, 2017Updated 8 years ago
- ☆12Jun 13, 2016Updated 9 years ago
- Python crawler for remote Windows shares☆12Nov 29, 2015Updated 10 years ago
- Build an SSL capable transparent proxying WiFi Access point with budget commodity hardware and Open Source software.☆15Mar 1, 2013Updated 13 years ago
- My Personal Library for CTF's☆12Apr 3, 2018Updated 7 years ago
- Server for receiving autorun data from the clients☆13Sep 26, 2017Updated 8 years ago
- Compiler Fingerprinting☆14Apr 24, 2015Updated 10 years ago
- ☆11Mar 9, 2018Updated 7 years ago
- AIM MCP Server :: Guard and Protect your MCPs & AI Chatting☆18Oct 13, 2025Updated 4 months ago
- Docker Version of Aquatone☆14May 21, 2018Updated 7 years ago
- Transform AWS Config snapshots to a more AWS Athena-friendly format.☆11Aug 26, 2020Updated 5 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago