SatoriCyber / universal-data-permissions-scannerLinks
Analyze assets authorization, who has access to what and how
☆76Updated 4 months ago
Alternatives and similar repositories for universal-data-permissions-scanner
Users that are interested in universal-data-permissions-scanner are comparing it to the libraries listed below
Sorting:
- ☆73Updated 3 months ago
- ☆262Updated 7 months ago
- Add a layer of active defense to your cloud applications.☆93Updated this week
- Automation tool for Windows Deception Host Burn-In☆86Updated 7 months ago
- CISA's space for collaboration on the Cybersecurity Performance Goals.☆74Updated 3 months ago
- SCuBA Secure Configuration Baselines and assessment tool for Google Workspace☆243Updated this week
- A simple-to-use IR (incident response) case management tool for tracking and documenting investigations.☆282Updated 2 weeks ago
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆81Updated 3 weeks ago
- OCSF Documentation☆132Updated last month
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆71Updated last year
- Template SOC2 Policy Authority - documentation pipeline☆114Updated 4 years ago
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CK…☆165Updated 9 months ago
- A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and contr…☆219Updated last month
- ☆32Updated 7 months ago
- Aranya user library, daemon, and policy code☆179Updated this week
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆239Updated last week
- Multi-services Honeypot Solution with AI support and dynamic HTTP template☆125Updated last month
- Halberd : Multi-Cloud Agentic Attack Tool☆296Updated this week
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆100Updated last year
- RedFlag uses AI to identify high-risk code changes. Run it in batch mode for release candidate testing or in CI pipelines to flag PRs and…☆149Updated 7 months ago
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆170Updated 5 months ago
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆156Updated this week
- A tool for AWS incident response, that allows for enumeration, acquisition and analysis of data from AWS environments for the purpose of …☆192Updated 9 months ago
- Cloud Offensive Breach and Risk Assessment (COBRA) Tool☆92Updated last month
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆113Updated this week
- A library of Incident Response notebooks using Jupyter. We will show how you can leverage pre-defined notebook files to guide your incide…☆147Updated last year
- Red Teaming for AI and Cloud☆183Updated last month
- Released at Black Hat Asia on April 18, 2024, Cloud Console Cartographer is a framework for condensing groupings of cloud events (e.g. Cl…☆168Updated last year
- MITRE ATT&CK Based App in Power BI☆16Updated last year
- A Secure Controls Framework (SCF) Power BI App☆21Updated 8 months ago