Permiso-io-tools / bucket-shieldView external linksLinks
☆14Jan 8, 2026Updated last month
Alternatives and similar repositories for bucket-shield
Users that are interested in bucket-shield are comparing it to the libraries listed below
Sorting:
- ☆30Jan 13, 2026Updated last month
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 10 months ago
- Azure Activity Log Axe is a continually developing tool that simplifies the transactional log format provided by Microsoft. The tool leve…☆35Sep 6, 2024Updated last year
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.☆15Aug 12, 2021Updated 4 years ago
- ☆18Jul 30, 2024Updated last year
- CVE, reports, research☆15Mar 17, 2021Updated 4 years ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- ☆18Feb 2, 2026Updated last week
- ☆41Nov 29, 2024Updated last year
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆73Jun 21, 2024Updated last year
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated 10 months ago
- A PoC exploit for CVE-2022-41622 - a CSRF in F5 BIG-IP control plane that leads to remote root☆21Oct 20, 2022Updated 3 years ago
- ☆25Jun 27, 2024Updated last year
- This application was built to help reduce the amount of time it takes to review AWS Lambda code.☆61Nov 11, 2024Updated last year
- Knowledge Report Alert & Normalization Generator☆26Updated this week
- ☆29Dec 26, 2025Updated last month
- Mirror of cisa.gov/kev data files☆67Feb 6, 2026Updated last week
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆59Sep 7, 2023Updated 2 years ago
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- Unauthenticated enumeration of AWS IAM Roles.☆26Sep 7, 2025Updated 5 months ago
- Demonstrates how a malicious dependency could negatively impact the build output.☆25Aug 11, 2023Updated 2 years ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆32Oct 14, 2024Updated last year
- ☆72Oct 24, 2025Updated 3 months ago
- GitHub Actions Cache Native Malware - for Educational and Research Purposes only.☆92Jan 28, 2026Updated 2 weeks ago
- ☆71Jan 8, 2025Updated last year
- EZGHSA is a command-line tool for summarizing and filtering vulnerability alerts on Github repositories.☆35Jan 4, 2026Updated last month
- Execute a shell command within Cloud Run☆31Jul 7, 2022Updated 3 years ago
- ☆65May 21, 2024Updated last year
- Compares and analyzes GCP IAM roles.☆78Mar 9, 2025Updated 11 months ago
- Python software that reads zone files, extract NS records, and detect cyclic dependencies☆36Feb 16, 2024Updated last year
- Leverage Ollion's GCP Landing Zone to deploy a secure, compliant foundation with ease. The repository contains an implementation of a sec…☆38Jun 13, 2024Updated last year
- Scan your account for the use of untrusted AMIs☆31Dec 5, 2025Updated 2 months ago
- A POC to implement Detection-as-Code with Terraform and Sumo Logic.☆30Jul 27, 2023Updated 2 years ago
- A tool that allows downloading S3 directories as ZIP files☆35Apr 28, 2023Updated 2 years ago
- Scans tcl for command injection☆36May 24, 2019Updated 6 years ago
- Grouper Python Client Library☆10Apr 18, 2023Updated 2 years ago
- This GitHub Action scans artifacts for secrets using gitleaks before uploading them.☆43Dec 6, 2025Updated 2 months ago
- This repository contains an IDA processor for loading and disassembling compiled yara rules.☆44Dec 31, 2024Updated last year
- Automated management of ad campaigns in Google Display&Video 360.☆14Updated this week