aquasecurity / cfsecLinks
Static analysis for CloudFormation templates to identify common misconfiguration
☆56Updated 3 years ago
Alternatives and similar repositories for cfsec
Users that are interested in cfsec are comparing it to the libraries listed below
Sorting:
- a tool to audit the istio service mesh☆173Updated 3 years ago
- Darkbit Cloud Security Tools☆25Updated 4 years ago
- A tool to check the security settings of Github Organizations.☆72Updated 2 years ago
- PolicyGlass allows you to analyse one or more AWS policies' effective permissions in aggregate, by restating them in the form of PolicySh…☆60Updated 3 years ago
- Trivy's misconfiguration scanning engine☆216Updated 8 months ago
- vscode extension for tfsec☆30Updated 2 years ago
- ☆23Updated 2 years ago
- ☆56Updated last month
- An SBOM query language and associated utilities☆54Updated last year
- Compares and analyzes GCP IAM roles.☆77Updated 7 months ago
- vexctl is a tool to attest VEX impact statements☆45Updated 2 years ago
- Useful scripts, Docker images, docker-compose apps, and Terraform modules.☆151Updated last week
- Open-source proof-of-concept client for AWS IAM Roles Anywhere☆71Updated 3 years ago
- Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).☆143Updated 5 months ago
- ☆34Updated 2 years ago
- ☆115Updated 2 months ago
- Slack alert bot for matching Github Audit Events☆10Updated 11 months ago
- Security configuration checks for popular cloud native applications and infrastructure.☆119Updated 3 years ago
- Runtime Security Solution for your CI/CD Pipeline☆110Updated 4 months ago
- Dockerfile Security Checker using OPA Rego policies with Conftest☆62Updated 3 years ago
- Securing Alice's, Bob's and Carl's software supply chain using in-toto☆98Updated this week
- Clean accounts over permissions in GCP infra at scale☆71Updated 2 years ago
- No need for IAM users when we have Yubikeys☆159Updated 3 years ago
- CloudSplaining on AWS Managed Policies☆44Updated last month
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆105Updated last year
- Common Golang Packages for use by the Various Cloud Nuke Tools☆47Updated last week
- Security scanning & static analysis tool☆94Updated last year
- OpenCSPM Community Controls☆14Updated 4 years ago
- ☆139Updated 7 months ago
- Use SQL to instantly query GCP resources across regions, projects and organizations. Open source CLI. No DB required.☆44Updated last week