OWASP / www-project-top-10-infrastructure-security-risks
OWASP Top 10 Infrastructure Security Risks
☆28Updated last week
Alternatives and similar repositories for www-project-top-10-infrastructure-security-risks:
Users that are interested in www-project-top-10-infrastructure-security-risks are comparing it to the libraries listed below
- ☆38Updated 9 months ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆21Updated this week
- Add a layer of active defense to your cloud applications.☆86Updated last week
- Tool for obfuscating and deobfuscating data.☆67Updated 10 months ago
- HashiCorp-relevant rules for the Semgrep code analysis tool☆39Updated last year
- ☆69Updated 10 months ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆97Updated 2 months ago
- Clean accounts over permissions in GCP infra at scale☆71Updated last year
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆12Updated 3 years ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆64Updated 6 months ago
- ☆26Updated 2 months ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆70Updated 8 months ago
- ☆46Updated 2 months ago
- Security tool against dependency typosquatting attacks☆39Updated last week
- InfoSec OpenAI Examples☆19Updated last year
- ☆55Updated last year
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆47Updated 2 months ago
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆50Updated last month
- Knowledge Report Alert & Normalization Generator☆27Updated 10 months ago
- Semgrep-based Policy Controller for Kubernetes☆24Updated 2 months ago
- ☆37Updated last year
- Global Security Database Tools☆42Updated last year
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated 3 months ago
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆43Updated this week
- ☆34Updated 3 weeks ago
- A self assessment tool to help understand your level in the SANS Vulnerability Management Maturity Model (VMMM).☆20Updated last year
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆36Updated 3 months ago
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆94Updated last year
- MetaHub is an automated contextual security findings enrichment and impact evaluation tool for vulnerability management.☆166Updated this week
- ☆32Updated 5 months ago