Prevenity / Cloud-SecurityLinks
GCP and GSUITE security auditing scripts
☆27Updated last year
Alternatives and similar repositories for Cloud-Security
Users that are interested in Cloud-Security are comparing it to the libraries listed below
Sorting:
- Materials for the BSides NoVA/Charleston 2018 Bro Workshop☆14Updated last month
- Tools for AWS forensics☆63Updated 9 years ago
- Leverage the ability of Terraform and AWS or GCP to distribute large security scans across numerous cloud instances.☆94Updated last year
- Hayat is a script for report and analyze Google Cloud Platform resources.☆80Updated 5 years ago
- A command line security audit tool for Amazon Web Services☆82Updated 6 years ago
- A simple file-based scanner to look for potential AWS access and secret keys in files☆93Updated last year
- 🏰 A Python script for AWS S3 bucket enumeration.☆54Updated 5 years ago
- Python module for evaluation of AWS account best practices around incident handling readieness.☆55Updated 5 years ago
- Google Cloud Platform Security Tool☆234Updated 5 years ago
- Monitoring GitHub for sensitive data shared publicly☆66Updated 3 years ago
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Updated 7 years ago
- All-in-one tool for managing vulnerability reports from AppSec pipelines☆106Updated 2 years ago
- A collection of slides, videos, and proof-of-concept scripts from various Rhino presentations.☆38Updated 6 years ago
- This script is used to generate some basic detections of the aws security services☆71Updated 3 years ago
- Comet is an alert distribution framework which allows you to distribute alerts all the way to the resource owner with customizable owner …☆59Updated 3 years ago
- Welcome to OpenDevSecOps! Our mission is to deliver highly-resilient, readily-available and free defensive and offensive devops security …☆21Updated 6 years ago
- Proof of Concept Zappa Based AWS Persistence and Attack Platform☆39Updated 5 years ago
- Finding Valuable Needles in Global Source Code Haystacks with Automation☆17Updated 4 years ago
- Find potential Indicators of Compromise among similar Linux servers☆29Updated 7 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆77Updated 3 years ago
- Serverless honeytoken 🕵🏻♂️☆80Updated 2 years ago
- A Lambda-powered Security Orchestration framework for AWS GuardDuty☆52Updated 5 years ago
- Identify compromised domains or emails. A python based HIBP and HackedEmails wrapper☆38Updated 6 years ago
- A tool for automatically gathering sensitive information from exposed Jenkins servers☆104Updated 2 years ago
- Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/)☆89Updated 2 years ago
- AWS Extender CLI is a command-line script to test S3 buckets as well as Google Storage buckets and Azure Storage containers for common mi…☆83Updated 5 years ago
- Security Operations Center Multiple Purpose Tool, takes IP address input, conducts OSINT, conducts splunk, bro, fireeye, imperva, and fir…☆21Updated 8 years ago
- A static website template for security pages.☆52Updated last week
- ☆67Updated 7 years ago
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.☆111Updated 4 years ago