TNG / cumulusLinks
Cumulus. Threat modeling the Clouds.
☆40Updated last week
Alternatives and similar repositories for cumulus
Users that are interested in cumulus are comparing it to the libraries listed below
Sorting:
- Compares and analyzes GCP IAM roles.☆77Updated 7 months ago
- A tool to check the security settings of Github Organizations.☆72Updated 2 years ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆177Updated 11 months ago
- App that simplifies building decision trees to model adverse scenarios☆219Updated last year
- Documenting your Threat Models with HCL☆436Updated 2 weeks ago
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆112Updated 2 weeks ago
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆36Updated last year
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61Updated 2 years ago
- Attaché provides an emulation layer for Cloud Provider IMDS APIs☆60Updated last year
- Supply-Chain Firewall (SCFW) is a tool for preventing the installation of malicious npm and PyPI packages☆171Updated this week
- HashiCorp-relevant rules for the Semgrep code analysis tool☆42Updated 2 years ago
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆40Updated last year
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by use…☆73Updated 2 years ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆111Updated 10 months ago
- The security workflow engine!☆125Updated 2 weeks ago
- Protect against subdomain takeover☆94Updated 3 months ago
- Clean accounts over permissions in GCP infra at scale☆71Updated 2 years ago
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆59Updated 9 months ago
- 🖇️ STRIDE vs. ASVS equivalence table☆77Updated last year
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆105Updated last year
- Security scanning & static analysis tool☆93Updated last year
- ☆114Updated 2 months ago
- ☆56Updated last month
- Useful scripts, Docker images, docker-compose apps, and Terraform modules.☆151Updated 2 weeks ago
- Pentester-focused Docker registry tool to enumerate and pull images☆35Updated 2 weeks ago
- OWASP Foundation Web Respository☆99Updated 3 weeks ago
- ☆37Updated 6 months ago
- boostsecurityio/poutine☆341Updated last week
- ☆25Updated last year
- ☆31Updated last year