Optum / ChaoSlingr
ChaoSlingr: Introducing Security into Chaos Testing
☆67Updated 5 years ago
Alternatives and similar repositories for ChaoSlingr:
Users that are interested in ChaoSlingr are comparing it to the libraries listed below
- The SOCless automation framework☆139Updated last month
- 'Continuous' AWS perimeter monitoring: Periodically scan internet facing AWS resources to detect misconfigured services.☆64Updated 5 years ago
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆98Updated last year
- InSpec profile to validate your VPC to the standards of the CIS Amazon Web Services Foundations Benchmark☆78Updated 2 months ago
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.☆48Updated 8 years ago
- ☆82Updated 5 years ago
- A repository for wardley maps related to security topics.☆47Updated 8 years ago
- 🖇️ STRIDE vs. ASVS equivalence table☆76Updated 7 months ago
- A small set of scripts to summarize AWS Security Groups, and generate visualizations of the rules.☆62Updated 4 years ago
- IAM-Deescalate helps mitigate privilege escalation risk in AWS identity and access management (IAM)☆98Updated 2 years ago
- ☆112Updated 2 months ago
- GCP CSPM using Google Sheets☆35Updated 9 months ago
- Convert cloudtrail data to MITRE ATT&CK Sightings☆79Updated 2 years ago
- Lightspin AWS IAM Vulnerability Scanner☆96Updated 3 years ago
- ☆371Updated last year
- Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).☆141Updated last year
- AWS docs, guides, and other tools☆76Updated 2 years ago
- ☆63Updated 2 years ago
- Reapsaw is a continuous security devsecops tool, which helps in enabling security into CI/CD Pipeline. It supports coverage for multiple …☆41Updated 4 years ago
- Example detection of compromise credentials in AWS☆121Updated 6 years ago
- This repo is a consolidation of Secure Software Supply Chain resources, such as talks, whitepapers, conferences and more.☆137Updated 2 years ago
- Documenting your Threat Models with HCL☆425Updated 6 months ago
- A deliberately vulnerable Kubernetes cluster☆124Updated last year
- OWASP Cloud Security - Enabling conversations through threat and control stories☆179Updated 6 years ago
- Python installable command line utiltity for mitigation of host and key compromises.☆344Updated 3 years ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆170Updated 4 months ago
- OWASP Foundation Threat Dragon Project Web Repository☆78Updated this week
- A unified DevSecOps Framework that allows you to go from iterative, collaborative Threat Modeling to Application Security Test Orchestrat…☆278Updated last week
- Remote Memory Acquisition Tool☆245Updated 4 years ago
- Repository for the Open Information Security Risk Universe☆63Updated 2 years ago