A catalog of services that can be publicly exposed within different cloud providers.
☆14Aug 30, 2024Updated last year
Alternatives and similar repositories for cloud-exposure-catalog
Users that are interested in cloud-exposure-catalog are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tracker for Encryption by Default for AWS Resources☆14Apr 10, 2025Updated last year
- Repository to archive AWS Documentation for local use☆50Oct 14, 2024Updated last year
- Data perimeter helper is a tool that helps you design and anticipate the impact of your data perimeter controls☆17Jan 21, 2026Updated 3 months ago
- Cloud Commotion intends to cause chaos to simulate security incidents☆148Jun 18, 2024Updated last year
- Awesome AWS service control policies (SCPs), Resource Control Policies (RCPs), and other organizational policies☆32Nov 26, 2025Updated 5 months ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Recon tool to query cloud prefixes for services associated with an IP address☆22Oct 2, 2024Updated last year
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago
- Prescriptive Sentinel policies that can be used to establish secure Terraform configuration for Amazon Web Services networking infrastruc…☆13Jan 12, 2026Updated 3 months ago
- An AI-backed threat hunting assistant that aligns to the PEAK framework.☆41Apr 27, 2026Updated last week
- A library of policies for Pulumi's Policy as Code☆19Feb 1, 2026Updated 3 months ago
- Short deep dive into Threat Hunting on AWS☆19Oct 15, 2023Updated 2 years ago
- Suzaku (朱雀) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.☆174Mar 29, 2026Updated last month
- ☆15Updated this week
- Listing of resources for example AWS Service Control Policies (SCPs)☆16Jan 10, 2024Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Repository to archive GCP Documentation for local use☆16Feb 11, 2025Updated last year
- Given a list of domains and known IP and buckets that are owned, which might be susceptible to domain hijacking?☆15Sep 20, 2024Updated last year
- Scripts that I've written that others may find useful☆13Aug 17, 2022Updated 3 years ago
- A little tool to filter the stranger strings from a binary so you can analyze the good ones☆54Sep 11, 2025Updated 7 months ago
- Large enterprises try to find a balance between controlling risk and empowering their developers in alignment with DevOps practices. Id…☆20Oct 28, 2021Updated 4 years ago
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆175Mar 11, 2026Updated last month
- An AWS IAM Privilege Escalation Path Library☆129Apr 27, 2026Updated last week
- Example of using boto3 to generate JSON for pulumi import☆13Sep 16, 2025Updated 7 months ago
- Data about all known supply-chain attacks through history☆66May 28, 2025Updated 11 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- An AWS IAM policy statement parser and query tool.☆199Feb 10, 2026Updated 2 months ago
- Go(od) Job is a simple job scheduler that supports task retries, logging, and task sharding.☆12Sep 10, 2024Updated last year
- ☆376Feb 23, 2024Updated 2 years ago
- Performing secure code review with LLMs (and vibe coding IDEs)☆41Aug 5, 2025Updated 8 months ago
- 非涉密源码☆19Mar 13, 2024Updated 2 years ago
- A public repository of MITRE ATT&ACK TTP mappings by BushidoUK for OSINT reports that lack a section breaking down the TTPs.☆27Mar 20, 2025Updated last year
- ☆46Nov 7, 2024Updated last year
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆106Nov 24, 2023Updated 2 years ago
- BLE based C2 for Hak5's Bash Bunny☆19Oct 31, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- 云原生安全漏洞收集☆18Jul 9, 2025Updated 9 months ago
- cloudflare worker version☆11Sep 14, 2025Updated 7 months ago
- Rust implementation of the DCSO Bloom filter☆29Jul 15, 2025Updated 9 months ago
- Finds Domain Controller on a network, enumerates users, AS-REP Roasting and hash cracking, bruteforces password, dumps AD users, DRSUAPI,…☆18Sep 23, 2023Updated 2 years ago
- ☆29Dec 26, 2025Updated 4 months ago
- Tool for obfuscating and deobfuscating data.☆77Mar 20, 2024Updated 2 years ago
- A simple web app to get the latest EPSS data for a CVE ID☆12Dec 14, 2025Updated 4 months ago