WithSecureLabs / cloud-security-vm
Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments
☆40Updated last month
Related projects ⓘ
Alternatives and complementary repositories for cloud-security-vm
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆57Updated last year
- A tool to uncover undocumented APIs from the AWS Console.☆80Updated last month
- AWS honey token manager☆84Updated 3 months ago
- ☆42Updated 2 weeks ago
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆43Updated 6 months ago
- HashiCorp-relevant rules for the Semgrep code analysis tool☆37Updated last year
- ☆28Updated 3 months ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆26Updated 3 weeks ago
- Generates runbooks for GuardDuty findings☆34Updated 4 months ago
- ☆22Updated this week
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆30Updated 3 weeks ago
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆43Updated 10 months ago
- Tool for obfuscating and deobfuscating data.☆63Updated 7 months ago
- Repository to archive AWS Documentation for local use☆38Updated 3 weeks ago
- A toolset to juggle AWS roles for persistent access☆51Updated 2 months ago
- Public repository of all things cloud security.☆32Updated last month
- Generate datasets of cloud audit logs for common attacks☆183Updated 3 months ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆55Updated 7 months ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆84Updated last month
- Compares and analyzes GCP IAM roles.☆76Updated 5 months ago
- ☆21Updated this week
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆79Updated last week
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Updated 2 years ago
- AWSXenos will list all the trust relationships in all the IAM roles, S3 buckets, and more☆61Updated 5 months ago
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆33Updated 3 months ago
- ☆38Updated 4 months ago
- Convert cloudtrail data to MITRE ATT&CK Sightings☆79Updated 2 years ago
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆92Updated 11 months ago
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆34Updated 2 months ago
- A Golang program to rotate AWS & GCP account keys☆65Updated 2 months ago