andresriancho / aws-audit-automationView external linksLinks
Tools to automate AWS Cloud security assessments
☆24Mar 26, 2020Updated 5 years ago
Alternatives and similar repositories for aws-audit-automation
Users that are interested in aws-audit-automation are comparing it to the libraries listed below
Sorting:
- A Django vulnerable Web application for testing the w3af framework☆32Jul 6, 2022Updated 3 years ago
- AWS Backup implementation in terraform☆13Feb 8, 2020Updated 6 years ago
- REST API client to consume w3af☆17May 22, 2023Updated 2 years ago
- A small pentesting lab for Azure☆10Apr 19, 2019Updated 6 years ago
- Visualizing Path Finding using A* algorithm☆14Nov 7, 2022Updated 3 years ago
- A set of tools that allow researchers to experiment with certificate chain validation issues☆13Dec 4, 2019Updated 6 years ago
- ElasticSearch vulnerable scanner☆16Oct 6, 2019Updated 6 years ago
- Collection of snippets for devtools.☆13Mar 17, 2021Updated 4 years ago
- Capture-The-Flag(CTF) toolkit☆11Jan 8, 2015Updated 11 years ago
- ☆12Jun 21, 2017Updated 8 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- Collection of the cheat sheets useful for pentesting☆10May 11, 2018Updated 7 years ago
- This automation protect against subdomain takeover on AWS env which also send alerts on slack.☆12Aug 1, 2021Updated 4 years ago
- Funny Fuzzing Wordlist☆14Jun 14, 2022Updated 3 years ago
- TSLint rules for Angular☆18Nov 30, 2018Updated 7 years ago
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆11Dec 20, 2021Updated 4 years ago
- Passive subdomain enumeration tool with http-probe.☆32Apr 30, 2021Updated 4 years ago
- Everything about xss protection technology☆14Oct 22, 2019Updated 6 years ago
- A capture-the-flag exercise based on data analysis challenges☆19Jan 30, 2020Updated 6 years ago
- This is the repository for NIST Blockchain developments☆15Nov 7, 2017Updated 8 years ago
- Monitors the network for new connected MAC addresses☆17Dec 10, 2022Updated 3 years ago
- ☆15Feb 5, 2022Updated 4 years ago
- ☆17May 2, 2024Updated last year
- A multi-threaded scanner that helps identify CORS flaws/misconfigurations☆19Nov 18, 2019Updated 6 years ago
- ☆15Feb 1, 2019Updated 7 years ago
- An invoice management application built on the MEAN stack with intentional vulnerabilities used to demonstrate insecure configurations an…☆16Sep 4, 2020Updated 5 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Oct 5, 2020Updated 5 years ago
- Different DFIR and CTI utilities☆38May 13, 2020Updated 5 years ago
- A small library to alter AWS API requests; Used for fuzzing research☆22Nov 2, 2023Updated 2 years ago
- 优质安全 list☆12Nov 22, 2017Updated 8 years ago
- Empire is a PowerShell and Python 3.x post-exploitation framework.☆18Aug 6, 2020Updated 5 years ago
- A curated list of awesome AWS IAM tools, libraries guides, blogs, and other resources☆17Jan 5, 2020Updated 6 years ago
- Presentations, training modules, and other education materials from Duo Security's Application Security team.☆76Jul 15, 2021Updated 4 years ago
- Offensive Terraform module which creates Kali Linux from the AWS marketplace and installs cloud security tools (Pacu, Cloudsplaining, Sco…☆18Sep 27, 2020Updated 5 years ago
- Script for Reconnaissance(Bug Bounty)☆18May 15, 2022Updated 3 years ago
- New Engineering Manager Curriculum☆16Apr 9, 2020Updated 5 years ago
- LDAP Injection Vulnerability Application(Blog Sample Code)☆22Oct 4, 2018Updated 7 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19May 27, 2017Updated 8 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Apr 16, 2021Updated 4 years ago