Prevenity / Cloud-Security
GCP and GSUITE security auditing scripts
☆26Updated 10 months ago
Alternatives and similar repositories for Cloud-Security:
Users that are interested in Cloud-Security are comparing it to the libraries listed below
- A collection of slides, videos, and proof-of-concept scripts from various Rhino presentations.☆38Updated 6 years ago
- A simple file-based scanner to look for potential AWS access and secret keys in files☆90Updated 11 months ago
- Python module for evaluation of AWS account best practices around incident handling readieness.☆55Updated 4 years ago
- Hayat is a script for report and analyze Google Cloud Platform resources.☆80Updated 5 years ago
- Monitoring GitHub for sensitive data shared publicly☆66Updated 3 years ago
- Scans Slack for API tokens, credentials, passwords, and more using YARA rules☆38Updated 4 years ago
- Welcome to OpenDevSecOps! Our mission is to deliver highly-resilient, readily-available and free defensive and offensive devops security …☆21Updated 6 years ago
- 'Continuous' AWS perimeter monitoring: Periodically scan internet facing AWS resources to detect misconfigured services.☆64Updated 5 years ago
- Amazon S3 bucket spelunking!☆85Updated 7 years ago
- Materials for the BSides NoVA/Charleston 2018 Bro Workshop☆14Updated last year
- A bunch of scripts I use to work with urlscan.io☆33Updated 5 years ago
- Tools for AWS forensics☆64Updated 8 years ago
- Combining OSINT sources in Elastic Stack☆80Updated 4 years ago
- Golang-based subdomain miner leveraging certificate transparency logs☆77Updated last year
- Leverage the ability of Terraform and AWS or GCP to distribute large security scans across numerous cloud instances.☆92Updated last year
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Updated 6 years ago
- Manage GuardDuty At Enterprise Scale☆22Updated 4 years ago
- Pentester-focused Docker registry tool to enumerate and pull images☆105Updated 5 years ago
- Google Cloud Platform Security Tool☆234Updated 5 years ago
- Repository for all the workshop content delivered at nullcon X on 1st of March 2019☆81Updated 5 years ago
- Jupyter Notebooks and code used for DNS MX mining to identify top email security providers☆54Updated last year
- A Lambda-powered Security Orchestration framework for AWS GuardDuty☆52Updated 5 years ago
- A packer utility to create and capture DFIR Image for use AWS & Azure☆15Updated 5 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆76Updated 2 years ago
- Pivot into private VPC networks using a VPN connection☆41Updated 5 years ago
- Finding Valuable Needles in Global Source Code Haystacks with Automation☆18Updated 4 years ago
- Terraform stack to deploy ELK Threat Hunting on Amazon AWS.☆90Updated 5 years ago
- Repo to hold the markdown-ified metadata on AppSec tools that are automation-friendly☆12Updated 8 years ago
- A tool to enumerate S3 buckets manually or via certstream☆82Updated last year
- Monitor the internet attack surface of various public cloud environments. Currently supports AWS, GCP, Azure, DigitalOcean and Oracle Clo…☆123Updated 11 months ago