SatoriCyber / universal-data-permissions-scanner
Analyze assets authorization, who has access to what and how
☆76Updated 5 months ago
Related projects ⓘ
Alternatives and complementary repositories for universal-data-permissions-scanner
- ☆67Updated 9 months ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆64Updated 5 months ago
- Automation tool for Windows Deception Host Burn-In☆76Updated 4 months ago
- ☆251Updated this week
- Tool for obfuscating and deobfuscating data.☆64Updated 8 months ago
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CK…☆161Updated last month
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆85Updated 10 months ago
- A library of Incident Response notebooks using Jupyter. We will show how you can leverage pre-defined notebook files to guide your incide…☆141Updated last year
- Cloud Offensive Breach and Risk Assessment (COBRA) Tool☆76Updated this week
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆59Updated last year
- God Mode Detection Rules☆131Updated 3 months ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆49Updated last month
- Halberd : Multi-Cloud Attack Tool☆216Updated this week
- Azure Activity Log Axe is a continually developing tool that simplifies the transactional log format provided by Microsoft. The tool leve…☆22Updated 2 months ago
- Add a layer of active defense to your cloud applications.☆82Updated this week
- HASH (HTTP Agnostic Software Honeypot)☆128Updated 6 months ago
- Use AI to Scan Your Code from the Command Line for security and code smells. Bring your own keys. Supports OpenAI and Gemini☆149Updated 8 months ago
- ThreatModel for Azure Storage - Library of all the attack scenarios on Azure Storage, and how to mitigate them following a risk-based app…☆57Updated last year
- A tool to uncover undocumented APIs from the AWS Console.☆84Updated this week
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆252Updated last week
- A tool for AWS incident response, that allows for enumeration, acquisition and analysis of data from AWS environments for the purpose of …☆178Updated last month
- Released at Black Hat Asia on April 18, 2024, Cloud Console Cartographer is a framework for condensing groupings of cloud events (e.g. Cl…☆157Updated 6 months ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆125Updated last year
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆96Updated last month
- Anvilogic Forge☆86Updated this week
- ☆31Updated this week
- OCSF Schema WEB Server☆42Updated this week
- RedFlag uses AI to identify high-risk code changes. Run it in batch mode for release candidate testing or in CI pipelines to flag PRs and…☆140Updated this week
- This is a RSS feed collection for all the InfoSec Content Creators☆30Updated last year
- ATHI — An AI Threat Modeling Framework for Policymakers☆45Updated last year