Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix
☆59Sep 7, 2023Updated 2 years ago
Alternatives and similar repositories for cspm_evaluation_matrix
Users that are interested in cspm_evaluation_matrix are comparing it to the libraries listed below
Sorting:
- ☆25Jun 27, 2024Updated last year
- ☆14Jan 8, 2026Updated last month
- Compares and analyzes GCP IAM roles.☆78Mar 9, 2025Updated 11 months ago
- ☆28Dec 26, 2025Updated 2 months ago
- 🖇️ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.☆76Aug 22, 2024Updated last year
- ☆18Jul 30, 2024Updated last year
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆120Feb 4, 2026Updated last month
- Repository to archive GCP Documentation for local use☆16Feb 11, 2025Updated last year
- ☆65May 21, 2024Updated last year
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- ☆22Jul 24, 2025Updated 7 months ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- Public repository to provide guidance and examples for people to start learning IaC. This repository also contains some open-hack style l…☆23Jun 14, 2023Updated 2 years ago
- Crowdsourced list of sensitive IAM Actions☆159Oct 29, 2024Updated last year
- HashiCorp-relevant rules for the Semgrep code analysis tool☆41Oct 3, 2023Updated 2 years ago
- Threat model for Azure Storage - Library of all the attack scenarios on Azure Storage, and how to mitigate them following a risk-based ap…☆59Feb 21, 2026Updated last week
- Markdown Version of the DHS/CISA Secure Software Development Self Attestation Form.☆22May 4, 2023Updated 2 years ago
- ☆40Nov 29, 2024Updated last year
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide☆43Dec 16, 2024Updated last year
- Knowledge Report Alert & Normalization Generator☆26Feb 11, 2026Updated 3 weeks ago
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆338Feb 13, 2026Updated 2 weeks ago
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- Enable Falco to read audit logs from EKS☆11Dec 13, 2020Updated 5 years ago
- ☆10Aug 9, 2024Updated last year
- Go support for parsing, compiling, and installing Chromium OS Seccomp-BPF policy files.☆12Mar 21, 2016Updated 9 years ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 10 months ago
- Azure Activity Log Axe is a continually developing tool that simplifies the transactional log format provided by Microsoft. The tool leve…☆35Sep 6, 2024Updated last year
- Collection of semi-useful Service Control Policies and scripts to manage them☆102Feb 1, 2025Updated last year
- Cloud Commotion intends to cause chaos to simulate security incidents☆146Jun 18, 2024Updated last year
- A simple threat modeling tool to help humans to reduce time-to-value when threat modeling☆680Updated this week
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆287May 16, 2025Updated 9 months ago
- Safety philosopy: example principles for an organization and management☆13Apr 14, 2025Updated 10 months ago
- Tweets when new GCP IAM updates are found☆13Feb 24, 2026Updated last week
- Harness the security superpowers of your cloud asset inventory☆11Sep 22, 2024Updated last year
- truffleproc — hunt secrets in process memory (TruffleHog & gdb mashup)☆123Aug 20, 2023Updated 2 years ago
- This application was built to help reduce the amount of time it takes to review AWS Lambda code.☆61Nov 11, 2024Updated last year
- ☆117Feb 11, 2026Updated 3 weeks ago
- ATHI — An AI Threat Modeling Framework for Policymakers☆60Aug 21, 2023Updated 2 years ago