WTFender / cf-lambda-public-url-prohibited
Detect publicly accessible Lambda Function URLs in your AWS account
☆9Updated 2 years ago
Alternatives and similar repositories for cf-lambda-public-url-prohibited:
Users that are interested in cf-lambda-public-url-prohibited are comparing it to the libraries listed below
- Generates runbooks for GuardDuty findings☆35Updated 6 months ago
- Safer AWS SCP deployments via real-time monitoring☆49Updated last year
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆60Updated last year
- Convert cloudtrail data to MITRE ATT&CK Sightings☆79Updated 2 years ago
- Scripts to quickly fix security and compliance issues☆25Updated last year
- ☆46Updated 2 months ago
- ☆26Updated 2 months ago
- Compares and analyzes GCP IAM roles.☆77Updated 7 months ago
- AWS SSO Reporter☆54Updated last year
- Knowledge Report Alert & Normalization Generator☆27Updated 9 months ago
- CloudSplaining on AWS Managed Policies☆41Updated this week
- PolicyGlass allows you to analyse one or more AWS policies' effective permissions in aggregate, by restating them in the form of PolicySh…☆59Updated 3 years ago
- Repository to archive AWS Documentation for local use☆41Updated 3 months ago
- https://breaches.cloud☆36Updated 3 months ago
- HashiCorp-relevant rules for the Semgrep code analysis tool☆38Updated last year
- ☆111Updated this week
- ☆25Updated 2 months ago
- Updated incident response generator for training classes☆42Updated 3 years ago
- AWS honey token manager☆86Updated 5 months ago
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆50Updated last month
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆47Updated 2 months ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆59Updated last year
- Lightspin AWS IAM Vulnerability Scanner☆96Updated 3 years ago
- Deliberately vulnerable AWS resources for security assessment demos☆31Updated 2 years ago
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆30Updated 3 months ago
- ☆37Updated 11 months ago
- IAM-Deescalate helps mitigate privilege escalation risk in AWS identity and access management (IAM)☆96Updated 2 years ago
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆33Updated last month
- Whole-infrastructure automation tooling for AWS☆41Updated 6 months ago