KennaSecurity / toolkitLinks
Kenna Security API and Scripting Toolkit
☆34Updated last month
Alternatives and similar repositories for toolkit
Users that are interested in toolkit are comparing it to the libraries listed below
Sorting:
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆78Updated 3 years ago
- Maturity Model Collaborative project☆15Updated 2 years ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Updated 3 years ago
- InfoSec OpenAI Examples☆19Updated last year
- Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/)☆89Updated 2 years ago
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆52Updated 2 months ago
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Updated 2 years ago
- Dependency Combobulator☆93Updated last year
- Virtual Security Operations Center☆51Updated 2 years ago
- ☆10Updated 3 years ago
- Fun tools around the EBS Direct API☆19Updated 4 years ago
- Salesforce Policy Deviation Checker☆30Updated 4 years ago
- ☆12Updated 2 months ago
- Scanner to identify dangling DNS records and subdomain takeovers☆46Updated 9 months ago
- Presentations, training modules, and other education materials from Duo Security's Application Security team.☆76Updated 4 years ago
- ☆113Updated 2 years ago
- AWS SSO serverless phishing API.☆32Updated 4 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆32Updated 3 years ago
- ☆39Updated last year
- 🖇️ STRIDE vs. ASVS equivalence table☆76Updated last year
- A small library to alter AWS API requests; Used for fuzzing research☆22Updated last year
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆12Updated 3 years ago
- An open source Wireshark extcap to make ad hoc mirroring of AWS EC2 traffic easier☆19Updated 9 months ago
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.☆110Updated 4 years ago
- Serverless honeytoken 🕵🏻♂️☆80Updated 2 years ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆66Updated 2 months ago
- An example of a mis-configured Rails application release under MIT license.☆20Updated 2 years ago
- ☆41Updated 6 months ago
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by use…☆72Updated 2 years ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Updated 4 years ago