A catalog of services that can be publicly exposed within different cloud providers.
☆14Aug 30, 2024Updated last year
Alternatives and similar repositories for cloud-exposure-catalog
Users that are interested in cloud-exposure-catalog are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tracker for Encryption by Default for AWS Resources☆14Apr 10, 2025Updated last year
- Repository to archive AWS Documentation for local use☆50Oct 14, 2024Updated last year
- Data perimeter helper is a tool that helps you design and anticipate the impact of your data perimeter controls☆17Jan 21, 2026Updated 2 months ago
- Cloud Commotion intends to cause chaos to simulate security incidents☆148Jun 18, 2024Updated last year
- Harness the security superpowers of your cloud asset inventory☆11Sep 22, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Awesome AWS service control policies (SCPs), Resource Control Policies (RCPs), and other organizational policies☆32Nov 26, 2025Updated 4 months ago
- Recon tool to query cloud prefixes for services associated with an IP address☆23Oct 2, 2024Updated last year
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago
- Prescriptive Sentinel policies that can be used to establish secure Terraform configuration for Amazon Web Services networking infrastruc…☆13Jan 12, 2026Updated 3 months ago
- TIM is a Kusto investigation platform that enables a user to quickly pivot between data sources; annotate their findings; and promotes co…☆23Aug 7, 2024Updated last year
- An AI-backed threat hunting assistant that aligns to the PEAK framework.☆37Jan 30, 2026Updated 2 months ago
- Go library for mapping IP address ranges to cloud provider regions (currently: AWS and GCP)☆23Updated this week
- This solution will help you automate user group assignment to permission sets in AWS IAM Identity center for accessing any or all AWS acc…☆25Mar 24, 2025Updated last year
- Server for receiving autorun data from the clients☆13Sep 26, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Short deep dive into Threat Hunting on AWS☆19Oct 15, 2023Updated 2 years ago
- Suzaku (朱雀) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.☆173Mar 29, 2026Updated 2 weeks ago
- Listing of resources for example AWS Service Control Policies (SCPs)☆16Jan 10, 2024Updated 2 years ago
- Repository to archive GCP Documentation for local use☆16Feb 11, 2025Updated last year
- Generates runbooks for GuardDuty findings☆38Jun 24, 2024Updated last year
- Powershell Based tool for gathering information related to O365 intrusions and potential Breaches☆18Dec 29, 2024Updated last year
- Scripts that I've written that others may find useful☆13Aug 17, 2022Updated 3 years ago
- ☆12Mar 31, 2021Updated 5 years ago
- Large enterprises try to find a balance between controlling risk and empowering their developers in alignment with DevOps practices. Id…☆20Oct 28, 2021Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- An AWS IAM Privilege Escalation Path Library☆127Apr 2, 2026Updated last week
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆174Mar 11, 2026Updated last month
- Example of using boto3 to generate JSON for pulumi import☆13Sep 16, 2025Updated 6 months ago
- Data about all known supply-chain attacks through history☆65May 28, 2025Updated 10 months ago
- An AWS IAM policy statement parser and query tool.☆199Feb 10, 2026Updated 2 months ago
- Performing secure code review with LLMs (and vibe coding IDEs)☆38Aug 5, 2025Updated 8 months ago
- Go(od) Job is a simple job scheduler that supports task retries, logging, and task sharding.☆12Sep 10, 2024Updated last year
- ☆376Feb 23, 2024Updated 2 years ago
- ☆49Mar 21, 2023Updated 3 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Helps contributors adhere to best practices for your repository on GitHub. 🗺️☆31Updated this week
- Prowler Studio is an AI assistant that helps you to create threat detection checks, remediations and update compliance frameworks for Pro…☆48Updated this week
- ☆22Sep 9, 2019Updated 6 years ago
- 非涉密源码☆19Mar 13, 2024Updated 2 years ago
- An index of publicly available and open-source threat detection rulesets.☆130Apr 17, 2025Updated 11 months ago
- A public repository of MITRE ATT&ACK TTP mappings by BushidoUK for OSINT reports that lack a section breaking down the TTPs.☆26Mar 20, 2025Updated last year