Permiso-io-tools / bucket-shieldLinks
☆14Updated 4 months ago
Alternatives and similar repositories for bucket-shield
Users that are interested in bucket-shield are comparing it to the libraries listed below
Sorting:
- A PoC to Simulate Ransomware Attack on AWS Environment☆32Updated last year
- ☆31Updated 4 months ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆16Updated last year
- Fun tools around the EBS Direct API☆19Updated 4 years ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆30Updated 8 months ago
- ☆47Updated last year
- ☆60Updated 2 years ago
- ☆34Updated 4 years ago
- Tool for obfuscating and deobfuscating data.☆74Updated last year
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events i…☆51Updated this week
- Repository to archive GCP Documentation for local use☆16Updated 9 months ago
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.☆31Updated 2 years ago
- A catalog of services that can be publicly exposed within different cloud providers.☆15Updated last year
- A recon tool for GCP Service Account Keys that requires no permissions☆25Updated 6 months ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Updated 3 years ago
- The Event Maturity Matrix (EMM) is a comprehensive framework that provides clarity regarding the capabilities and nuances of SaaS audit l…☆29Updated 4 months ago
- ☆10Updated 3 years ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Updated 4 years ago
- Scan your account for the use of untrusted AMIs☆30Updated 2 months ago
- Short deep dive into Threat Hunting on AWS☆14Updated 2 years ago
- ☆51Updated last month
- This application was built to help reduce the amount of time it takes to review AWS Lambda code.☆61Updated last year
- A GitHub Actions Supply Chain CTF / Goat☆26Updated last week
- ☆39Updated last year
- ☆23Updated last year
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Updated last year
- A tool for secrets management, encryption as a service, and privileged access management☆14Updated 3 months ago
- Security Alert Decoration☆27Updated 3 months ago
- ☆18Updated last year
- Proof of Concepts for malicious maintainers: How to Tamper with Releases built with GitHub Actions Worfklows, presented at fwd:cloudsec E…☆76Updated last month