Repository to archive AWS Documentation for local use
☆50Oct 14, 2024Updated last year
Alternatives and similar repositories for awsdocs
Users that are interested in awsdocs are comparing it to the libraries listed below
Sorting:
- A catalog of services that can be publicly exposed within different cloud providers.☆14Aug 30, 2024Updated last year
- Repository to archive GCP Documentation for local use☆16Feb 11, 2025Updated last year
- Harness the security superpowers of your cloud asset inventory☆11Sep 22, 2024Updated last year
- Optimize long AWS IAM policies by strategically using wildcards, reducing the number of characters, and maintaining the intended scope of…☆15Nov 14, 2024Updated last year
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆174Updated this week
- An AWS IAM Privilege Escalation Path Library☆119Updated this week
- Example AWS Resource control policies to get started or mature your usage of AWS RCPs.☆198Feb 2, 2026Updated 3 weeks ago
- yams is a Go library, server, and CLI providing foundational capabilities to simulate access for AWS IAM policies☆35Feb 20, 2026Updated last week
- ☆46Nov 7, 2024Updated last year
- A toolset to juggle AWS roles for persistent access☆63Aug 14, 2024Updated last year
- Cybersecurity Architects Handbook, published by Packt☆27Mar 27, 2024Updated last year
- Opinionated Go Project Template☆13Feb 20, 2026Updated last week
- Repo to hold the markdown-ified metadata on AppSec tools that are automation-friendly☆12Jun 13, 2016Updated 9 years ago
- Threat Modeling with ATT&CK defines how to integreate MITRE ATT&CK® into your organization’s existing threat modeling methodology.☆12May 28, 2025Updated 8 months ago
- ☆14Jan 8, 2026Updated last month
- Create simple AWS Budgets notifications☆16Feb 1, 2026Updated 3 weeks ago
- An LLM leaderboard for stateful agents☆20Oct 16, 2025Updated 4 months ago
- Updated incident response generator for training classes☆43Jun 2, 2021Updated 4 years ago
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆93Updated this week
- Mutable Universal Relay Document Kit☆17Oct 31, 2014Updated 11 years ago
- Lightweight macOS detection agent built on Santa’s Endpoint Security telemetry.☆105Dec 3, 2025Updated 2 months ago
- Progzee is a Python library for simplifying IP proxy usage in HTTP requests.☆16Feb 28, 2025Updated last year
- Powershell Based tool for gathering information related to O365 intrusions and potential Breaches☆17Dec 29, 2024Updated last year
- A Security Scanner for Go☆26Feb 11, 2019Updated 7 years ago
- ☆18Jun 24, 2024Updated last year
- Runs IAM policy linting and security checks against either a single AWS account or multiple member accounts of an AWS Organization.☆152Dec 21, 2025Updated 2 months ago
- Crowdsourced list of sensitive IAM Actions☆159Oct 29, 2024Updated last year
- Google Maps for AWS IAM☆261Feb 21, 2026Updated last week
- Summaries, transcripts, key points, and other useful insights from AWS re:inforce 2025 talks for those of us who don't have time to watch…☆103Jun 25, 2025Updated 8 months ago
- FireEye iSIGHT Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform☆16Oct 12, 2018Updated 7 years ago
- L3 construct that can be used to quickly deploy a complete EC2 Image Builder Image Pipeline☆43Updated this week
- A tool to uncover undocumented APIs from the AWS Console.☆116Apr 29, 2025Updated 9 months ago
- Many AWS Accounts, one email address.☆22Jan 8, 2026Updated last month
- Github action to retrieve all (added, copied, modified, deleted, renamed, type changed, unmerged, unknown) files and directories. Secure …☆79Feb 2, 2026Updated 3 weeks ago
- Visualize Microsoft Defender XDR process trees and security events☆33Aug 24, 2025Updated 6 months ago
- This repository provides a comprehensive collection of Pulumi scenarios utilized by cnappgoat☆21Jan 28, 2025Updated last year
- The Data Landing Zone is a CDK Construct designed to create a landing zone tailored for supporting and enabling AI, data-driven, data mes…☆22Updated this week
- CDK Construct to allow creation of Route 53 records in a different account☆19Updated this week
- AISA-Scanner is an AI-powered autonomous vulnerability scanner that maps CVEs to metasploit exploits, MITRE, CEH, and SANS, delivering in…☆32Jul 31, 2025Updated 7 months ago