aws-samples / generative-ai-security-runbooksView external linksLinks
☆39Nov 14, 2025Updated 2 months ago
Alternatives and similar repositories for generative-ai-security-runbooks
Users that are interested in generative-ai-security-runbooks are comparing it to the libraries listed below
Sorting:
- ☆17Mar 10, 2025Updated 11 months ago
- This repository shows how to setup Centralized CloudWatch Observability Manager using Terraform☆17Nov 28, 2024Updated last year
- This example demonstrates a pattern to leverage multiple identity providers with an API Gateway and manage Authorization with Amazon Veri…☆18Jan 22, 2024Updated 2 years ago
- Continuous Threat Exposure Management Maturity Model (CTEMMM)☆29Feb 6, 2026Updated last week
- Many AWS Accounts, one email address.☆22Jan 8, 2026Updated last month
- ☆18Dec 13, 2023Updated 2 years ago
- In this solution, we will walk through the steps required to automatically create and maintain a custom enterprise controls catalog and a…☆17Oct 17, 2023Updated 2 years ago
- Employee Productivity GenAI Assistant Example is an innovative code sample and architecture pattern designed to enhance writing tasks eff…☆24Updated this week
- SageStrike is an offensive security tool for simulating and evaluating post-exploitation scenarios in AWS SageMaker environments.☆19Aug 2, 2025Updated 6 months ago
- ☆25May 2, 2016Updated 9 years ago
- ☆22Oct 18, 2023Updated 2 years ago
- AWS STS Network Query Tool uses cross account roles to collect networking related information for multiple accounts and outputs a CSV.☆26Feb 3, 2024Updated 2 years ago
- This solutions facilitates rapid deployment of Prowler, full AWS Organization analysis, and finding processing as part of a security post…☆61Jun 2, 2025Updated 8 months ago
- PaddingZip is a tool that you can craft a zip file that contains the padding characters between the file content.☆81Aug 14, 2022Updated 3 years ago
- A collection of helper scripts for migrating existing AWS IAM federation into AWS SSO☆13Aug 30, 2021Updated 4 years ago
- Red-Team - AI Agent to Phish Employees based on Social Intelligence.☆22Dec 28, 2025Updated last month
- Enhance GitHub security by revoking unused credentials automatically with TenTwentyOne's GitHub Action☆17Apr 4, 2025Updated 10 months ago
- ☆34May 24, 2022Updated 3 years ago
- ☆35Feb 27, 2025Updated 11 months ago
- Automated AWS Organizations configuration for security operations☆37Feb 24, 2025Updated 11 months ago
- This repository contains exercises that show how to use AWS Secrets Manager in different scenarios.☆41Oct 4, 2021Updated 4 years ago
- Generates runbooks for GuardDuty findings☆38Jun 24, 2024Updated last year
- ☆42Jul 23, 2025Updated 6 months ago
- CriminalIP is a threat intelligence service that provides detailed information about IP addresses, domains, and other network elements.☆13Aug 20, 2024Updated last year
- Esta es una extensión del proyecto original de Avilla Forensics☆12Nov 18, 2025Updated 2 months ago
- Vulnerable code clone detection technique. Published in EuroS&P2020☆10Sep 4, 2020Updated 5 years ago
- ☆16Nov 30, 2025Updated 2 months ago
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- Download the latest Palo Alto Networks content update☆13Aug 23, 2018Updated 7 years ago
- A Kubernetes operator for managing NATS decentralized authentication resources.☆31Updated this week
- netbeacon - monitoring your network capture, NIDS or network analysis process☆19Oct 26, 2013Updated 12 years ago
- In addition to providing a solution to create and manage custom security controls and frameworks this repository provide an integration o…☆12Nov 14, 2023Updated 2 years ago
- ☆12Jun 17, 2024Updated last year
- ☆13Jun 10, 2024Updated last year
- Hack23 Public Information Security Management System:Security Through Transparency and Open Documentation Demonstrating Security Excellen…☆22Jan 26, 2026Updated 2 weeks ago
- Guidance for Organization on AWS☆12Nov 26, 2025Updated 2 months ago
- Interactive CD dependency diagram☆28Oct 31, 2025Updated 3 months ago
- Assisted Log Enabler for AWS - Find AWS resources that are not logging, and turn them on.☆270Updated this week
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆12Nov 23, 2023Updated 2 years ago