This application was built to help reduce the amount of time it takes to review AWS Lambda code.
☆61Nov 11, 2024Updated last year
Alternatives and similar repositories for CLAWS
Users that are interested in CLAWS are comparing it to the libraries listed below
Sorting:
- This is a custom SSM agent which is sorta functional☆17Jul 5, 2021Updated 4 years ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- A meta-database collecting resources that compile lists of breaches☆21Oct 30, 2025Updated 4 months ago
- Public repository to provide guidance and examples for people to start learning IaC. This repository also contains some open-hack style l…☆23Jun 14, 2023Updated 2 years ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆59Sep 20, 2023Updated 2 years ago
- ☆14Jan 8, 2026Updated last month
- Deliberately vulnerable AWS resources for security assessment demos☆32Aug 20, 2022Updated 3 years ago
- Implementing TCP/IP in Rust leveraging eBPF/XDP☆21Mar 30, 2025Updated 11 months ago
- ☆18Jul 30, 2024Updated last year
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆98Updated this week
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated 10 months ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆283Nov 27, 2025Updated 3 months ago
- Given a list of domains and known IP and buckets that are owned, which might be susceptible to domain hijacking?☆15Sep 20, 2024Updated last year
- python3 scripts to help with aws triage needs☆15Feb 11, 2022Updated 4 years ago
- ☆229Updated this week
- Crowdsourced list of sensitive IAM Actions☆159Oct 29, 2024Updated last year
- Compares and analyzes GCP IAM roles.☆78Mar 9, 2025Updated 11 months ago
- SCP management tool☆135Oct 23, 2023Updated 2 years ago
- Revised shell script for parsing .gnmap, .xml, or .nmap port scan results files to a CSV list, lists of IPs per port, web urls, and a sum…☆13Apr 17, 2020Updated 5 years ago
- Convert cloudtrail data to MITRE ATT&CK Sightings☆82Jul 25, 2022Updated 3 years ago
- ☆86Feb 4, 2026Updated 3 weeks ago
- Recon tool to query cloud prefixes for services associated with an IP address☆23Oct 2, 2024Updated last year
- ☆124May 26, 2025Updated 9 months ago
- Burp Extension for AWS Signing☆90Jan 10, 2025Updated last year
- ☆25Jun 27, 2024Updated last year
- ☆40Nov 29, 2024Updated last year
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆49Dec 29, 2023Updated 2 years ago
- SprayShark is a modular G-Suite password sprayer with threading!☆57May 17, 2025Updated 9 months ago
- SharePoint Security Auditor☆21Jan 16, 2016Updated 10 years ago
- Access Undenied parses AWS AccessDenied CloudTrail events, explains the reasons for them, and offers actionable remediation steps. Open-s…☆267Jan 26, 2023Updated 3 years ago
- GitHub Actions Cache Native Malware - for Educational and Research Purposes only.☆97Jan 28, 2026Updated last month
- Knowledge Report Alert & Normalization Generator☆26Feb 11, 2026Updated 2 weeks ago
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆142Nov 3, 2025Updated 3 months ago
- Cobalt Strike log state tracking, parsing, and storage☆24Jul 18, 2019Updated 6 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Aug 29, 2021Updated 4 years ago
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆338Feb 13, 2026Updated 2 weeks ago
- Create your own vulnerable by design AWS penetration testing playground☆437Feb 16, 2026Updated last week
- A simple mitmproxy blueprint to intercept HTTPS traffic from app running on Kubernetes☆75Apr 14, 2025Updated 10 months ago