airbnb / vulnture
☆68Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for vulnture
- AWS Red Team Orchestration Framework☆102Updated 7 years ago
- 'Continuous' AWS perimeter monitoring: Periodically scan internet facing AWS resources to detect misconfigured services.☆62Updated 5 years ago
- a tool to audit the istio service mesh☆173Updated 3 years ago
- The original AWS security enforcer™☆59Updated 5 years ago
- Serverless honeytoken 🕵🏻♂️☆78Updated last year
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Updated 2 years ago
- Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/)☆87Updated last year
- CLI tool for auditing S3 buckets☆109Updated last year
- The SOCless automation framework☆134Updated 2 months ago
- PolicyGlass allows you to analyse one or more AWS policies' effective permissions in aggregate, by restating them in the form of PolicySh…☆58Updated 2 years ago
- A command line security audit tool for Amazon Web Services☆80Updated 5 years ago
- Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).☆138Updated 7 months ago
- ☆107Updated last month
- ☆82Updated 4 years ago
- Reapsaw is a continuous security devsecops tool, which helps in enabling security into CI/CD Pipeline. It supports coverage for multiple …☆41Updated 4 years ago
- Simple DLP monitor for AWS S3 is a tool built on top of CloudWatch events and Lambda functions to alert you when data is transferred to S…☆17Updated 4 years ago
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆175Updated 2 months ago
- InSpec profile to validate your VPC to the standards of the CIS Amazon Web Services Foundations Benchmark☆77Updated 5 months ago
- Darkbit Cloud Security Tools☆25Updated 4 years ago
- Runtime security plug to protect user containers☆65Updated last week
- K8s API Honeypot with Active Defense Capabilities☆39Updated 10 months ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆74Updated 2 years ago
- Automation of VPC Traffic Mirror Sessions in AWS☆35Updated last month
- INTERCEPT / Policy as Code Auditing & Compliance☆82Updated 2 weeks ago
- Compares and analyzes GCP IAM roles.☆76Updated 5 months ago