This application was built to help reduce the amount of time it takes to review AWS Lambda code.
☆61Nov 11, 2024Updated last year
Alternatives and similar repositories for CLAWS
Users that are interested in CLAWS are comparing it to the libraries listed below
Sorting:
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- This is a custom SSM agent which is sorta functional☆17Jul 5, 2021Updated 4 years ago
- A meta-database collecting resources that compile lists of breaches☆21Oct 30, 2025Updated 4 months ago
- Given a list of domains and known IP and buckets that are owned, which might be susceptible to domain hijacking?☆15Sep 20, 2024Updated last year
- Deliberately vulnerable AWS resources for security assessment demos☆32Aug 20, 2022Updated 3 years ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆59Sep 20, 2023Updated 2 years ago
- Implementing TCP/IP in Rust leveraging eBPF/XDP☆21Mar 30, 2025Updated 11 months ago
- ☆14Jan 8, 2026Updated 2 months ago
- SCP management tool☆135Oct 23, 2023Updated 2 years ago
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆283Nov 27, 2025Updated 3 months ago
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆100Mar 14, 2026Updated last week
- ☆21Apr 17, 2023Updated 2 years ago
- Public repository to provide guidance and examples for people to start learning IaC. This repository also contains some open-hack style l…☆23Jun 14, 2023Updated 2 years ago
- ☆229Mar 10, 2026Updated last week
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated 11 months ago
- Access Undenied parses AWS AccessDenied CloudTrail events, explains the reasons for them, and offers actionable remediation steps. Open-s…☆267Jan 26, 2023Updated 3 years ago
- ☆18Jul 30, 2024Updated last year
- Crowdsourced list of sensitive IAM Actions☆159Oct 29, 2024Updated last year
- ☆124May 26, 2025Updated 9 months ago
- Compares and analyzes GCP IAM roles.☆78Mar 9, 2025Updated last year
- Convert cloudtrail data to MITRE ATT&CK Sightings☆82Jul 25, 2022Updated 3 years ago
- Multilayered secret detection tool☆41Feb 11, 2026Updated last month
- Welcome to the Very Vulnerable Lambda Application repository! This repository contains an intentionally vulnerable serverless applicatio…☆11Jul 22, 2024Updated last year
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61May 15, 2023Updated 2 years ago
- ☆86Feb 4, 2026Updated last month
- python3 scripts to help with aws triage needs☆15Feb 11, 2022Updated 4 years ago
- truffleproc — hunt secrets in process memory (TruffleHog & gdb mashup)☆124Aug 20, 2023Updated 2 years ago
- Generates runbooks for GuardDuty findings☆38Jun 24, 2024Updated last year
- ☆40Nov 29, 2024Updated last year
- ☆11May 1, 2024Updated last year
- Attaché provides an emulation layer for Cloud Provider IMDS APIs☆60Updated this week
- Collection of example Service Control Policies (SCPs) that are useful for sandbox and training AWS accounts.☆161Dec 22, 2025Updated 2 months ago
- Automated Cloud Misconfiguration Testing☆22Jun 20, 2025Updated 9 months ago
- A simple mitmproxy blueprint to intercept HTTPS traffic from app running on Kubernetes☆75Apr 14, 2025Updated 11 months ago
- Cobalt Strike log state tracking, parsing, and storage☆24Jul 18, 2019Updated 6 years ago
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆49Dec 29, 2023Updated 2 years ago
- OWASP Domain Protect - prevent subdomain takeover☆397Dec 23, 2024Updated last year
- TACOS framework structural details☆20May 12, 2025Updated 10 months ago