Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix
☆59Sep 7, 2023Updated 2 years ago
Alternatives and similar repositories for cspm_evaluation_matrix
Users that are interested in cspm_evaluation_matrix are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆120Mar 13, 2026Updated last week
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- Compares and analyzes GCP IAM roles.☆78Mar 9, 2025Updated last year
- Crowdsourced list of sensitive IAM Actions☆159Oct 29, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- 🖇️ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.☆76Aug 22, 2024Updated last year
- ☆22Jul 24, 2025Updated 8 months ago
- ☆14Jan 8, 2026Updated 2 months ago
- HashiCorp-relevant rules for the Semgrep code analysis tool☆41Oct 3, 2023Updated 2 years ago
- Markdown Version of the DHS/CISA Secure Software Development Self Attestation Form.☆22May 4, 2023Updated 2 years ago
- ☆65May 21, 2024Updated last year
- Harness the security superpowers of your cloud asset inventory☆11Sep 22, 2024Updated last year
- Threat model for Azure Storage - Library of all the attack scenarios on Azure Storage, and how to mitigate them following a risk-based ap…☆59Updated this week
- ☆28Dec 26, 2025Updated 2 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- SCP management tool☆135Oct 23, 2023Updated 2 years ago
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆339Mar 17, 2026Updated last week
- ☆18Jul 30, 2024Updated last year
- A simple threat modeling tool to help humans to reduce time-to-value when threat modeling☆688Updated this week
- A crowdsourced Azure RBAC permissions reference.☆17Jul 9, 2025Updated 8 months ago
- Collection of semi-useful Service Control Policies and scripts to manage them☆102Feb 1, 2025Updated last year
- Cloud Commotion intends to cause chaos to simulate security incidents☆146Jun 18, 2024Updated last year
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide☆43Dec 16, 2024Updated last year
- Repository to archive GCP Documentation for local use☆16Feb 11, 2025Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆16Feb 10, 2025Updated last year
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆289May 16, 2025Updated 10 months ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- ☆36Apr 29, 2025Updated 10 months ago
- ☆25Jun 27, 2024Updated last year
- ☆40Nov 29, 2024Updated last year
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆54Apr 25, 2023Updated 2 years ago
- Enable Falco to read audit logs from EKS☆11Dec 13, 2020Updated 5 years ago
- MCP Bridge is a lightweight, fast, and LLM-agnostic proxy for connecting to multiple Model Context Protocol (MCP) servers through a unifi…☆61Jul 7, 2025Updated 8 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆10Aug 9, 2024Updated last year
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆62Jan 25, 2025Updated last year
- A demo showing how to maintain persistency on Power Platform by installing an automation factory that creates, executes and deletes arbit…☆14Aug 30, 2022Updated 3 years ago
- truffleproc — hunt secrets in process memory (TruffleHog & gdb mashup)☆124Aug 20, 2023Updated 2 years ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆89Jan 28, 2024Updated 2 years ago
- Azure Activity Log Axe is a continually developing tool that simplifies the transactional log format provided by Microsoft. The tool leve…☆35Sep 6, 2024Updated last year
- A tool for AWS incident response, that allows for enumeration, acquisition and analysis of data from AWS environments for the purpose of …☆198Jan 6, 2026Updated 2 months ago