Repository to archive GCP Documentation for local use
☆16Feb 11, 2025Updated last year
Alternatives and similar repositories for gcpdocs
Users that are interested in gcpdocs are comparing it to the libraries listed below
Sorting:
- ☆18Jul 30, 2024Updated last year
- Repository to archive AWS Documentation for local use☆50Oct 14, 2024Updated last year
- Collection of Docker honeypot logs from 2021 - 2024☆36Sep 30, 2024Updated last year
- ☆12Jun 17, 2024Updated last year
- OCSF Schema Validation☆13Dec 13, 2024Updated last year
- Go support for parsing, compiling, and installing Chromium OS Seccomp-BPF policy files.☆12Mar 21, 2016Updated 9 years ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 10 months ago
- Harness the security superpowers of your cloud asset inventory☆11Sep 22, 2024Updated last year
- Tweets when new GCP IAM updates are found☆13Feb 24, 2026Updated last week
- Deliberately vulnerable AWS resources for security assessment demos☆32Aug 20, 2022Updated 3 years ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆142Jan 2, 2025Updated last year
- A catalog of services that can be publicly exposed within different cloud providers.☆14Aug 30, 2024Updated last year
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securit…☆37Oct 17, 2024Updated last year
- Given a list of domains and known IP and buckets that are owned, which might be susceptible to domain hijacking?☆15Sep 20, 2024Updated last year
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- Painless One-Time Passwords on Mac OS X with Yubikey, supporting GMail 2-step verification and other OATH-TOTP applications☆47Feb 1, 2016Updated 10 years ago
- ☆40Aug 2, 2024Updated last year
- ☆40Nov 29, 2024Updated last year
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆40Aug 29, 2024Updated last year
- Recon tool to query cloud prefixes for services associated with an IP address☆23Oct 2, 2024Updated last year
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆98Updated this week
- Public repository to provide guidance and examples for people to start learning IaC. This repository also contains some open-hack style l…☆23Jun 14, 2023Updated 2 years ago
- Scalable integrity framework for ABAC on AWS☆56Mar 14, 2025Updated 11 months ago
- ☆25Jun 27, 2024Updated last year
- A GitHub Actions Supply Chain CTF / Goat☆27Jan 6, 2026Updated last month
- Creates needed resources for federating access between a GCP service account and AWS IAM role.☆29Apr 3, 2024Updated last year
- An AWS IAM Privilege Escalation Path Library☆119Feb 23, 2026Updated last week
- Cloud Commotion intends to cause chaos to simulate security incidents☆145Jun 18, 2024Updated last year
- ☆28Dec 26, 2025Updated 2 months ago
- ☆55Apr 25, 2023Updated 2 years ago
- ☆29May 12, 2025Updated 9 months ago
- Write detections, investigate alerts, and query logs from your favorite AI agents☆40Feb 10, 2026Updated 2 weeks ago
- An implementation of an SFTP to Google Cloud Storage bridge.☆97Feb 20, 2024Updated 2 years ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Jan 12, 2024Updated 2 years ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆59Sep 7, 2023Updated 2 years ago
- Azure Activity Log Axe is a continually developing tool that simplifies the transactional log format provided by Microsoft. The tool leve…☆35Sep 6, 2024Updated last year
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆113Nov 13, 2024Updated last year
- OpenID Shared Signals and Events (SSE) / Continuous Access Evaluation Protocol (CAEP) / Risk Incident Sharing and Coordination (RISC) JSO…☆14Jun 7, 2024Updated last year
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year