artis3n / cloud-hackboxLinks
Create custom AMIs with Packer and Ansible to enable rapid provisioning of offensive infrastructure in AWS using Terraform.
☆21Updated 3 years ago
Alternatives and similar repositories for cloud-hackbox
Users that are interested in cloud-hackbox are comparing it to the libraries listed below
Sorting:
- AWS managed IAM policies☆128Updated 4 years ago
- A continuous security pipeline demo for the AWS DevSecOps Workshop.☆44Updated 5 years ago
- CloudSplaining on AWS Managed Policies☆44Updated 3 months ago
- InSpec profile to validate your VPC to the standards of the CIS Amazon Web Services Foundations Benchmark☆77Updated 3 months ago
- Is your AWS perimeter secure? Use Powerpipe and Steampipe to check your AWS accounts for public resources, resources shared with untrust…☆113Updated 3 months ago
- Python script for AWS resources inventory (cheaper than AWS Config)☆170Updated 3 weeks ago
- Assess certain AWS network configurations☆12Updated 7 years ago
- ☆23Updated 2 years ago
- A collection of useful queries that can be used to verify compliance/security across your AWS assets☆30Updated 6 years ago
- Hands-on workshop on how to build security automation in pipelines☆37Updated last year
- Public tables and other research that can accept PRs. Please visit the web link.☆44Updated 6 years ago
- PolicyGlass allows you to analyse one or more AWS policies' effective permissions in aggregate, by restating them in the form of PolicySh…☆60Updated 3 years ago
- AWS Certified Security Specialty (2020) course notes☆121Updated 5 years ago
- ☆63Updated last year
- A Workshop for AWS Security Hub Integration, Prioritization, and Response☆73Updated 2 years ago
- Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).☆143Updated 7 months ago
- Validate all your Customer IAM Policies against AWS Access Analyzer - Policy Validation☆43Updated 4 years ago
- Work with the AWS IP address ranges in native Python.☆13Updated 2 years ago
- The open source version of the AWS Control Tower docs. You can submit feedback & requests for changes by submitting issues in this repo o…☆27Updated 2 years ago
- Scripts to quickly fix security and compliance issues☆27Updated 2 years ago
- CDK app to setup an isolated AWS network to experiment with ways of exfiltrating data☆18Updated 4 years ago
- Terraform module to deploy cloudquery☆36Updated 2 years ago
- Code examples for the AWS Security Blog post: How to use CI/CD to deploy and configure AWS security services with Terraform☆97Updated 4 years ago
- bash functions to help run aws-cli commands across roles in multiple accounts with MFA☆69Updated 5 years ago
- SSH-Restricted deploys an SSH compliance rule (AWS Config) with auto-remediation via AWS Lambda if SSH access is public.☆30Updated 4 years ago
- Example detection of compromise credentials in AWS☆122Updated 7 years ago
- Automate the AWS GuardDuty account invitation lifecycle for all of your organizations AWS accounts in all regions as well as aggregate an…☆67Updated 2 years ago
- Useful scripts for maintaining multiple AWS Accounts☆45Updated last week
- A cloud security tool to search and clean up unused AWS access keys, written in Go.☆51Updated 3 years ago
- Crowdsourced list of sensitive IAM Actions☆156Updated last year