artis3n / cloud-hackboxLinks
Create custom AMIs with Packer and Ansible to enable rapid provisioning of offensive infrastructure in AWS using Terraform.
☆21Updated 2 years ago
Alternatives and similar repositories for cloud-hackbox
Users that are interested in cloud-hackbox are comparing it to the libraries listed below
Sorting:
- InSpec profile to validate your VPC to the standards of the CIS Amazon Web Services Foundations Benchmark☆78Updated 7 months ago
- AWS managed IAM policies☆128Updated 3 years ago
- Python script for AWS resources inventory (cheaper than AWS Config)☆169Updated 2 months ago
- Scripts to quickly fix security and compliance issues☆106Updated last year
- CloudSplaining on AWS Managed Policies☆44Updated this week
- Is your AWS perimeter secure? Use Powerpipe and Steampipe to check your AWS accounts for public resources, resources shared with untrust…☆112Updated 3 weeks ago
- Tools to help automate your AWS Accounts☆101Updated 11 months ago
- Red Team Scripts for AWS.☆170Updated 5 years ago
- Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).☆143Updated 3 months ago
- Lists all resources in a AWS account☆102Updated 2 years ago
- AWS Certified Security Specialty (2020) course notes☆121Updated 4 years ago
- Automated CIS Benchmark Compliance Remediation for Amazon Linux 2 with Ansible☆35Updated this week
- ☆63Updated 9 months ago
- Code examples for the AWS Security Blog post: How to use CI/CD to deploy and configure AWS security services with Terraform☆97Updated 4 years ago
- A continuous security pipeline demo for the AWS DevSecOps Workshop.☆45Updated 5 years ago
- ☆25Updated 3 years ago
- Validate all your Customer IAM Policies against AWS Access Analyzer - Policy Validation☆43Updated 4 years ago
- Useful scripts for maintaining multiple AWS Accounts☆45Updated 4 months ago
- A Workshop for AWS Security Hub Integration, Prioritization, and Response☆72Updated last year
- SSH-Restricted deploys an SSH compliance rule (AWS Config) with auto-remediation via AWS Lambda if SSH access is public.☆30Updated 4 years ago
- Example detection of compromise credentials in AWS☆122Updated 7 years ago
- A collection of useful queries that can be used to verify compliance/security across your AWS assets☆30Updated 6 years ago
- A small lambda script that will disable access keys older than a given amount of days.☆154Updated 2 years ago
- Assess certain AWS network configurations☆12Updated 6 years ago
- Dump your EC2 Security Groups as a CSV or JSON file☆71Updated 2 years ago
- AWSXenos will list all the trust relationships in all the IAM roles, S3 buckets, and more☆64Updated 5 months ago
- AWS Security Cookbook, published by Packt☆43Updated 2 years ago
- AWS Identity and Access Management Visualizer and Anomaly Finder☆296Updated last year
- Audit IAM roles and users using Access Advisor data using Python/boto3 SDK and automatically create IAM permissions boundaries to limit a…☆37Updated 4 years ago
- Get alerts when people are using the AWS console to modify create or modify resources.☆89Updated 3 years ago