bullfrogsec / bullfrog
Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows
☆79Updated this week
Related projects ⓘ
Alternatives and complementary repositories for bullfrog
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆57Updated last year
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆40Updated last month
- AWS honey token manager☆84Updated 3 months ago
- Compares and analyzes GCP IAM roles.☆76Updated 5 months ago
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆43Updated 5 months ago
- Convert cloudtrail data to MITRE ATT&CK Sightings☆79Updated 2 years ago
- ☆42Updated last week
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆29Updated 3 weeks ago
- HashiCorp-relevant rules for the Semgrep code analysis tool☆37Updated last year
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆55Updated 7 months ago
- ☆151Updated 2 months ago
- A tool to uncover undocumented APIs from the AWS Console.☆80Updated last month
- Cloud Commotion intends to cause chaos to simulate security incidents☆136Updated 4 months ago
- ☆109Updated 3 weeks ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆57Updated last year
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆34Updated 2 months ago
- Generate datasets of cloud audit logs for common attacks☆181Updated 3 months ago
- Tool for obfuscating and deobfuscating data.☆63Updated 7 months ago
- truffleproc — hunt secrets in process memory (TruffleHog & gdb mashup)☆110Updated last year
- Protect against subdomain takeover☆92Updated 5 months ago
- A Golang program to rotate AWS & GCP account keys☆65Updated 2 months ago
- Adaptive AWS Zero Trust Policy made easy: Auto-generate least-privilege policies based on user activity in real time! Accelerate the adop…☆73Updated 6 months ago
- boostsecurityio/poutine☆229Updated last week
- ☆107Updated last month
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆43Updated 10 months ago
- A Terraform module that makes it a snap to opt out of all AWS AI/ML data harvesting.☆30Updated 10 months ago
- Clean accounts over permissions in GCP infra at scale☆71Updated last year
- ☆51Updated 8 months ago
- GCP CSPM using Google Sheets☆34Updated 4 months ago
- prel(iminary) is an application that temporarily assigns Google Cloud IAM Roles and includes an approval process.☆36Updated this week