authomize / Open-ITDR
Authomize open solutions for partners and customers
☆30Updated 7 months ago
Alternatives and similar repositories for Open-ITDR:
Users that are interested in Open-ITDR are comparing it to the libraries listed below
- Connectors REST API Client☆16Updated 11 months ago
- ☆39Updated last year
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.☆271Updated 4 months ago
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by use…☆66Updated 2 years ago
- Lists of affected components and affected apps/vendors by CVE-2021-44228 (aka Log4shell or Log4j RCE). This list is meant as a resource f…☆54Updated 3 years ago
- Released at Black Hat Asia on April 18, 2024, Cloud Console Cartographer is a framework for condensing groupings of cloud events (e.g. Cl…☆161Updated 8 months ago
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆178Updated 4 months ago
- An open project to list all publicly known cloud vulnerabilities and CSP security issues☆313Updated this week
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆121Updated last month
- Graph-based security analysis for everyone☆339Updated last year
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆105Updated 3 months ago
- Open Source Cloud Security☆702Updated last year
- Dynamically generate and hunt with Lacework LQL queries quickly and efficiently☆27Updated last year
- ☆16Updated 8 months ago
- List of known AWS accounts☆177Updated last month
- Based on Lightspin proprietary data, research, and our tracking of cloud security trends in the market, our research team has compiled a …☆39Updated 2 years ago
- Documenting your Threat Models with HCL☆412Updated 4 months ago
- Open source compliance tool for development platforms.☆287Updated last year
- ☆111Updated this week
- ☆65Updated 7 months ago
- ☆171Updated last month
- The Amazon Elastic Kubernetes Service (EKS) Creation Engine (ECE) is a Python command-line program created by the Lightspin Office of the…☆40Updated 2 years ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆88Updated last year
- A Software as a Service (SaaS) log collection framework.☆147Updated last month
- Dorothy is a tool to test security monitoring and detection for Okta environments☆178Updated 5 months ago
- IAM-Deescalate helps mitigate privilege escalation risk in AWS identity and access management (IAM)☆96Updated 2 years ago
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆323Updated last year
- OCSF Documentation☆122Updated last month
- ☆19Updated 2 years ago
- Generate datasets of cloud audit logs for common attacks☆192Updated 5 months ago