OperantAI / secops-chaos
Red Teaming for AI and Cloud
☆25Updated this week
Alternatives and similar repositories for secops-chaos:
Users that are interested in secops-chaos are comparing it to the libraries listed below
- ☆16Updated 9 months ago
- Sample code snippets for consuming the CloudSploit API☆13Updated last year
- Darkbit Cloud Security Tools☆25Updated 4 years ago
- Microsoft Defender for Cloud threat matrix for Kubernetes☆25Updated 2 years ago
- VSCode Extension for Deciduous☆9Updated 4 months ago
- Markdown Version of the DHS/CISA Secure Software Development Self Attestation Form.☆21Updated 2 years ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆28Updated 2 months ago
- NIST OSCAL SDK and CLI☆19Updated 10 months ago
- TACOS framework structural details☆20Updated last year
- ☆16Updated 11 months ago
- ☁️ 🤖 LLM agent-based simulations to generate benign and malicious Cloud logs☆12Updated 9 months ago
- BRAVE (Bare Metal Replication And Virtualization Environment)☆39Updated last year
- ☆64Updated last week
- DefectDojo Community Content☆18Updated 6 months ago
- Repository to allow collaboration between Cycle Labs Cloud community in support of the community.☆9Updated 3 years ago
- Policy Pipeline : place an SDLC around your compliance documentation with a pipeline that renders policy-as-code to human friendly format…☆11Updated 4 years ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆63Updated 10 months ago
- Slack alert bot for matching Github Audit Events☆10Updated 5 months ago
- ☆16Updated 2 years ago
- ☆21Updated 2 years ago
- A collection of Docker and Kubernetes resources☆18Updated 2 years ago
- Posture Attribute Collection and Evaluation☆23Updated last year
- Xipher is a curated collection of cryptographic primitives put together to perform key/password based asymmetric encryption☆10Updated this week
- ☆12Updated last year
- This repository includes cloud security policies for IaC and live resources.☆39Updated 10 months ago
- A project to visualize the software supply chain☆50Updated last year
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆31Updated 6 months ago
- Use SQL to instantly query secrets and more from source code. Open source CLI. No DB required.☆17Updated 2 weeks ago
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆53Updated last year
- ☆10Updated 2 years ago