Netflix-Skunkworks / cloudy-kraken
AWS Red Team Orchestration Framework
☆102Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for cloudy-kraken
- Application Layer DoS Testing Framework☆253Updated 7 years ago
- INACTIVE - Security Testing Tool☆106Updated 8 years ago
- sleepy puppy docker setup☆45Updated 6 years ago
- AWS Metadata Proxy for protection against SSRF☆68Updated 4 years ago
- Cloud Auxiliary is a python wrapper and orchestration module for interacting with cloud providers☆76Updated last year
- ☆82Updated 4 years ago
- drydock provides a flexible way of assessing the security of your Docker daemon configuration and containers using editable audit templat…☆65Updated 8 years ago
- Minion☆355Updated 5 years ago
- AWS risky security change detector based on EDDA.☆82Updated 6 years ago
- ☆79Updated 9 years ago
- dockscan is security vulnerability and audit scanner for Docker installations☆218Updated 8 years ago
- Mittn: Security test tool runner for test automation in CI☆195Updated 10 months ago
- A collection of Ansible roles for automating infosec builds.☆92Updated 6 years ago
- The original AWS security enforcer™☆59Updated 5 years ago
- Reapsaw is a continuous security devsecops tool, which helps in enabling security into CI/CD Pipeline. It supports coverage for multiple …☆41Updated 4 years ago
- Proof of Concept Zappa Based AWS Persistence and Attack Platform☆37Updated 4 years ago
- ☆57Updated 4 years ago
- A serverless, event-driven AWS configuration collection service with configuration versioning.☆93Updated 3 years ago
- Enforce ownership and data security within AWS☆446Updated 4 years ago
- Osquery Mangement Server☆114Updated 4 years ago
- Things to know when DFIR occurs near a vault deployment.☆43Updated 6 years ago
- Kubernetes Auto Analyzer☆191Updated 4 years ago
- Google Cloud Platform Security Tool☆232Updated 5 years ago
- Python module for evaluation of AWS account best practices around incident handling readieness.☆55Updated 4 years ago
- ☆82Updated 2 years ago
- Defcon24 Workshop Contents : Ninja Level Infrastructure Monitoring☆124Updated 7 years ago
- Example detection of compromise credentials in AWS☆119Updated 6 years ago
- Exfiltrate files via DNS☆96Updated 11 years ago