SecurityRunners / awsdocs
Repository to archive AWS Documentation for local use
☆41Updated 4 months ago
Alternatives and similar repositories for awsdocs:
Users that are interested in awsdocs are comparing it to the libraries listed below
- Generates runbooks for GuardDuty findings☆35Updated 8 months ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆60Updated last year
- Public repository of all things cloud security.☆41Updated 5 months ago
- https://breaches.cloud☆38Updated 4 months ago
- A tool to uncover undocumented APIs from the AWS Console.☆97Updated 3 months ago
- An AWS metadata enumeration tool by Plerion☆91Updated last year
- Safer AWS SCP deployments via real-time monitoring☆50Updated last year
- ☆35Updated 4 months ago
- A catalog of services that can be publicly exposed within different cloud providers.☆14Updated 6 months ago
- ☆112Updated last month
- ☆43Updated 2 months ago
- Convert cloudtrail data to MITRE ATT&CK Sightings☆79Updated 2 years ago
- A collection of documented and undocumented AWS API models☆33Updated 3 months ago
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆50Updated 3 months ago
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆46Updated last year
- AWS honey token manager☆87Updated 7 months ago
- ☆28Updated 4 months ago
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆52Updated last month
- Tracker for Encryption by Default for AWS Resources☆14Updated 2 months ago
- Crowdsourced list of sensitive IAM Actions☆141Updated 4 months ago
- AWS SSO Reporter☆54Updated last year
- Data perimeter helper is a tool that helps you design and anticipate the impact of your data perimeter controls☆15Updated this week
- A PoC to Simulate Ransomware Attack on AWS Environment☆30Updated 4 months ago
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆101Updated last year
- This application was built to help reduce the amount of time it takes to review AWS Lambda code.☆60Updated 3 months ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆138Updated 2 months ago
- A toolset to juggle AWS roles for persistent access☆53Updated 6 months ago
- ☆46Updated 4 months ago
- Identify all permitted data paths originating from the Internet to Network Interfaces within AWS Accounts across the entire AWS Organizat…☆38Updated last year
- Cloud Commotion intends to cause chaos to simulate security incidents☆145Updated 8 months ago