A catalog of services that can be publicly exposed within different cloud providers.
☆14Aug 30, 2024Updated last year
Alternatives and similar repositories for cloud-exposure-catalog
Users that are interested in cloud-exposure-catalog are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Repository to archive AWS Documentation for local use☆50Oct 14, 2024Updated last year
- Data perimeter helper is a tool that helps you design and anticipate the impact of your data perimeter controls☆17Jan 21, 2026Updated 2 months ago
- Awesome AWS service control policies (SCPs), Resource Control Policies (RCPs), and other organizational policies☆32Nov 26, 2025Updated 3 months ago
- Recon tool to query cloud prefixes for services associated with an IP address☆23Oct 2, 2024Updated last year
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago
- Prescriptive Sentinel policies that can be used to establish secure Terraform configuration for Amazon Web Services networking infrastruc…☆13Jan 12, 2026Updated 2 months ago
- TIM is a Kusto investigation platform that enables a user to quickly pivot between data sources; annotate their findings; and promotes co…☆23Aug 7, 2024Updated last year
- An AI-backed threat hunting assistant that aligns to the PEAK framework.☆37Jan 30, 2026Updated last month
- Go library for mapping IP address ranges to cloud provider regions (currently: AWS and GCP)☆23Mar 16, 2026Updated last week
- Collection of Docker honeypot logs from 2021 - 2024☆36Sep 30, 2024Updated last year
- Short deep dive into Threat Hunting on AWS☆18Oct 15, 2023Updated 2 years ago
- Suzaku (朱雀) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.☆171Updated this week
- ☆14Updated this week
- Listing of resources for example AWS Service Control Policies (SCPs)☆16Jan 10, 2024Updated 2 years ago
- Repository to archive GCP Documentation for local use☆16Feb 11, 2025Updated last year
- Generates runbooks for GuardDuty findings☆38Jun 24, 2024Updated last year
- Powershell Based tool for gathering information related to O365 intrusions and potential Breaches☆17Dec 29, 2024Updated last year
- Scripts that I've written that others may find useful☆14Aug 17, 2022Updated 3 years ago
- A little tool to filter the stranger strings from a binary so you can analyze the good ones☆54Sep 11, 2025Updated 6 months ago
- Sample code with security policies in Pulumi CrossGuard to implement preventive security checks in Infrastructure pipelines☆12Jan 4, 2023Updated 3 years ago
- Large enterprises try to find a balance between controlling risk and empowering their developers in alignment with DevOps practices. Id…☆20Oct 28, 2021Updated 4 years ago
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆174Mar 11, 2026Updated 2 weeks ago
- Data about all known supply-chain attacks through history☆64May 28, 2025Updated 9 months ago
- An AWS IAM policy statement parser and query tool.☆199Feb 10, 2026Updated last month
- Go(od) Job is a simple job scheduler that supports task retries, logging, and task sharding.☆12Sep 10, 2024Updated last year
- ☆375Feb 23, 2024Updated 2 years ago
- ☆49Mar 21, 2023Updated 3 years ago
- Helps contributors adhere to best practices for your repository on GitHub. 🗺️☆31Updated this week
- A CLI tool for managing Chronicle user workflows☆18Sep 24, 2025Updated 6 months ago
- Prowler Studio is an AI assistant that helps you to create threat detection checks, remediations and update compliance frameworks for Pro…☆47Mar 18, 2026Updated last week
- 非涉密源码☆19Mar 13, 2024Updated 2 years ago
- An index of publicly available and open-source threat detection rulesets.☆130Apr 17, 2025Updated 11 months ago
- ☆46Nov 7, 2024Updated last year
- 云原生安全漏洞收集☆18Jul 9, 2025Updated 8 months ago
- Cumulus. Threat modeling the Clouds.☆28Oct 27, 2025Updated 4 months ago
- Rust implementation of the DCSO Bloom filter☆29Jul 15, 2025Updated 8 months ago
- ☆28Dec 26, 2025Updated 2 months ago
- Tool for obfuscating and deobfuscating data.☆77Mar 20, 2024Updated 2 years ago
- A simple web app to get the latest EPSS data for a CVE ID☆12Dec 14, 2025Updated 3 months ago