JDIS / Organisation
Dépôt relatif aux tâches organisationnelles et aux idées proposées pour JDIS
☆11Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for Organisation
- Défis et solutions de l'éditions UnitedCTF-2019☆15Updated 4 years ago
- AWS Serverless Security☆400Updated 2 years ago
- 🧨 The DynamoDB Migrations Tool Command Line Interface (dynamit-cli)☆18Updated last year
- Example detection of compromise credentials in AWS☆119Updated 6 years ago
- AWS Lambda Infection Toolkit // Persistent Lambda Malware PoC☆160Updated 7 years ago
- OWASP ServerlessGoat: a serverless application demonstrating common serverless security flaws☆320Updated 3 months ago
- Never run out of free events to attend !☆10Updated last month
- A honey token manager and alert system for AWS.☆316Updated 2 years ago
- A graph-based tool for visualizing effective access and resource relationships in AWS environments.☆922Updated 2 years ago
- Removes old versions of Lambda functions☆166Updated last year
- barq: The AWS Cloud Post Exploitation framework!☆386Updated 2 years ago
- Resource types that can be publicly exposed on AWS☆317Updated 2 years ago
- CircleCI docker image with Node.js and AWS CLI☆10Updated 5 years ago
- A library that delivers tools to analyze the bundle size of TypeScript/JavaScript CDK functions.☆12Updated 2 months ago
- AWS CDK Construct that, when attached to a CodePipeline, will report back to GitHub (using the GitHub Status API), whenever the CodePipel…☆10Updated last year
- AWS Identity and Access Management Visualizer and Anomaly Finder☆288Updated 5 months ago
- A Serverless Plugin to write If Else conditions in serverless YAML file☆69Updated last year
- A production-friendly malware scanner for your AWS cloud☆198Updated 3 years ago
- V stands for Validation☆27Updated this week
- $50 Million CTF from Hackerone - Writeup☆585Updated 5 years ago
- A CLI to watch and live-update your CDK Stack's Lambdas☆110Updated 2 years ago
- WeirdAAL (AWS Attack Library)☆781Updated last year
- App that simplifies building decision trees to model adverse scenarios☆181Updated 4 months ago
- A centralized source of all AWS IAM privilege escalation methods released by Rhino Security Labs.☆897Updated 5 years ago
- A project to collate IAM actions, AWS APIs and managed policies from various public sources.☆291Updated this week
- Custom Jest Assertions for Serverless integration testing.☆198Updated last year
- a Damn Vulnerable Serverless Application☆534Updated last year
- OWASP Serverless Top 10☆213Updated 3 years ago