OWASP / cumulus
Cumulus. Threat modeling the Clouds.
☆17Updated 6 months ago
Alternatives and similar repositories for cumulus:
Users that are interested in cumulus are comparing it to the libraries listed below
- Add a layer of active defense to your cloud applications.☆89Updated last week
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆170Updated 4 months ago
- An online multiplayer version of the threat modeling card games: Elevation of Privilege (EoP), OWASP Cornucopia, OWASP Cumulus, and Eleva…☆68Updated this week
- SecObserve is an open source vulnerability and license management system for software development teams and cloud environments. It suppor…☆126Updated this week
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆73Updated 10 months ago
- Protect against subdomain takeover☆93Updated 10 months ago
- A full insecure kubernetes application for testing security tools☆70Updated this week
- Discover vulnerabilities and container image misconfiguration in production environments.☆55Updated last month
- ☆29Updated 4 months ago
- AWS honey token manager☆87Updated 8 months ago
- Cloud Commotion intends to cause chaos to simulate security incidents☆145Updated 9 months ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆187Updated this week
- ☆60Updated 2 months ago
- ☆29Updated 5 months ago
- 🖇️ STRIDE vs. ASVS equivalence table☆76Updated 7 months ago
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆147Updated last month
- HashiCorp-relevant rules for the Semgrep code analysis tool☆39Updated last year
- A utility to (re-)import findings and language data into DefectDojo☆43Updated 6 months ago
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆53Updated 2 months ago
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆39Updated 7 months ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61Updated last year
- AI featured threat modeling and security review action☆43Updated 4 months ago
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆132Updated last year
- Generates runbooks for GuardDuty findings☆35Updated 9 months ago
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆30Updated 5 months ago
- ☆164Updated 6 months ago
- Tool for obfuscating and deobfuscating data.☆69Updated last year
- Security tool against dependency typosquatting attacks☆39Updated last week
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆138Updated 2 months ago
- Unauthenticated enumeration of AWS IAM Roles.☆23Updated 2 months ago