caizencloud / caizen
Harness the security superpowers of your cloud asset inventory
☆10Updated last month
Related projects ⓘ
Alternatives and complementary repositories for caizen
- Generates runbooks for GuardDuty findings☆34Updated 4 months ago
- Compares and analyzes GCP IAM roles.☆76Updated 5 months ago
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆30Updated 3 weeks ago
- Convert cloudtrail data to MITRE ATT&CK Sightings☆79Updated 2 years ago
- https://breaches.cloud☆36Updated 3 weeks ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆57Updated last year
- Deliberately vulnerable AWS resources for security assessment demos☆31Updated 2 years ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆57Updated last year
- AWS honey token manager☆84Updated 3 months ago
- Repository to archive AWS Documentation for local use☆38Updated 3 weeks ago
- GCP CSPM using Google Sheets☆34Updated 5 months ago
- ☆11Updated 8 months ago
- ☆109Updated 3 weeks ago
- Repository to archive GCP Documentation for local use☆13Updated last week
- Scripts to quickly fix security and compliance issues☆25Updated 11 months ago
- ☆42Updated 2 weeks ago
- Detect publicly accessible Lambda Function URLs in your AWS account☆9Updated 2 years ago
- Audit log wall of shame.☆41Updated 3 weeks ago
- HashiCorp-relevant rules for the Semgrep code analysis tool☆37Updated last year
- Cloud Offensive Breach and Risk Assessment (COBRA) Tool☆75Updated this week
- Public repository of all things cloud security.☆32Updated last month
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆40Updated last month
- A tool to uncover undocumented APIs from the AWS Console.☆80Updated last month
- A guide to simplify the process of evaluating Datadog's Cloud SIEM security capabilities to detect AWS threats.☆17Updated last year
- Automation associated with our talk: Attacking and Defending Infrastructure with Terraform☆16Updated 2 years ago
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆43Updated 10 months ago
- An AWS metadata enumeration tool by Plerion☆76Updated 9 months ago
- Identify all permitted data paths originating from the Internet to Network Interfaces within AWS Accounts across the entire AWS Organizat…☆36Updated last year