☆18Jul 30, 2024Updated last year
Alternatives and similar repositories for assured-workloads-terraform
Users that are interested in assured-workloads-terraform are comparing it to the libraries listed below
Sorting:
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 10 months ago
- A Golang program to rotate AWS & GCP account keys☆67May 12, 2025Updated 9 months ago
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆39Sep 25, 2024Updated last year
- Repository to archive GCP Documentation for local use☆16Feb 11, 2025Updated last year
- Public repository to provide guidance and examples for people to start learning IaC. This repository also contains some open-hack style l…☆23Jun 14, 2023Updated 2 years ago
- ☆25Jun 27, 2024Updated last year
- ☆40Nov 29, 2024Updated last year
- AWS honey token manager☆89Aug 1, 2024Updated last year
- ☆12Jun 17, 2024Updated last year
- ☆28Dec 26, 2025Updated 2 months ago
- prel(iminary) is an application that temporarily assigns Google Cloud IAM Roles and includes an approval process.☆46Updated this week
- ☆23Sep 20, 2024Updated last year
- Terraform to run Scoutsuite security scan of projects within a Google Cloud Org. Report will be published to a GCS bucket.☆17Jan 5, 2026Updated 2 months ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Use Neo4j to help visualize, explore and analyze GCP resources and IAM across your organization☆11Sep 1, 2020Updated 5 years ago
- Unauthenticated enumeration of AWS IAM Roles.☆26Sep 7, 2025Updated 5 months ago
- Azure Activity Log Axe is a continually developing tool that simplifies the transactional log format provided by Microsoft. The tool leve…☆35Sep 6, 2024Updated last year
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆113Nov 13, 2024Updated last year
- ☆14Jan 8, 2026Updated last month
- Deliberately vulnerable AWS resources for security assessment demos☆32Aug 20, 2022Updated 3 years ago
- ☆36Apr 29, 2025Updated 10 months ago
- Listing of resources for example AWS Service Control Policies (SCPs)☆17Jan 10, 2024Updated 2 years ago
- ☆22May 1, 2024Updated last year
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆59Sep 20, 2023Updated 2 years ago
- Federated Learning on Google Cloud☆19Updated this week
- This repository contains an IDA processor for loading and disassembling compiled yara rules.☆44Dec 31, 2024Updated last year
- ☆48Jan 5, 2026Updated 2 months ago
- ☆65May 21, 2024Updated last year
- Take automated actions against threats and vulnerabilities.☆216Sep 14, 2023Updated 2 years ago
- Compares and analyzes GCP IAM roles.☆78Mar 9, 2025Updated 11 months ago
- Go library for mapping IP address ranges to cloud provider regions (currently: AWS and GCP)☆22Feb 27, 2026Updated last week
- ☆43Apr 21, 2023Updated 2 years ago
- ☆40Aug 2, 2024Updated last year
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆46Feb 2, 2026Updated last month
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆49Dec 29, 2023Updated 2 years ago
- SprayShark is a modular G-Suite password sprayer with threading!☆57May 17, 2025Updated 9 months ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Dec 12, 2023Updated 2 years ago
- Report OPA Gatekeeper audit violations in Security Command Center.☆41Dec 13, 2024Updated last year