KennaSecurity / toolkitLinks
Kenna Security API and Scripting Toolkit
☆34Updated 2 weeks ago
Alternatives and similar repositories for toolkit
Users that are interested in toolkit are comparing it to the libraries listed below
Sorting:
- Dependency Combobulator☆93Updated last year
- Maturity Model Collaborative project☆15Updated 2 years ago
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆52Updated 3 months ago
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.☆111Updated 4 years ago
- InfoSec OpenAI Examples☆19Updated last year
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Updated 3 years ago
- Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/)☆89Updated 2 years ago
- ☆14Updated 3 months ago
- ☆60Updated 2 years ago
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Updated 2 years ago
- ☆41Updated 7 months ago
- A public cloud security knowledgebase - https://www.secwiki.cloud/☆51Updated 10 months ago
- Global Security Database Tools☆44Updated last year
- WAF bypass PoC☆49Updated last year
- ☆113Updated 2 years ago
- ☆10Updated 3 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆78Updated 3 years ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Updated 4 years ago
- The Event Maturity Matrix (EMM) is a comprehensive framework that provides clarity regarding the capabilities and nuances of SaaS audit l…☆28Updated 3 months ago
- Threat Modeling Manifesto☆29Updated last year
- Virtual Security Operations Center☆51Updated 2 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆33Updated 3 years ago
- Scanner to identify dangling DNS records and subdomain takeovers☆48Updated 10 months ago
- Scan your account for the use of untrusted AMIs☆29Updated last month
- ☆39Updated last year
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by use…☆72Updated 2 years ago
- Security Alert Decoration☆27Updated 2 months ago
- Static Token And Credential Scanner☆95Updated 2 years ago
- Presentations, training modules, and other education materials from Duo Security's Application Security team.☆77Updated 4 years ago
- 🖇️ STRIDE vs. ASVS equivalence table☆77Updated last year