carbonetes / brainiacLinks
BrainIAC uses static code analysis to analyze IAC code to detect security issues before deployment. This tool can scan for issues like security policy misconfigurations, insecure cloud-based services, and compliance issues.
☆70Updated last year
Alternatives and similar repositories for brainiac
Users that are interested in brainiac are comparing it to the libraries listed below
Sorting:
- Generates SBOMs for container images, filesystems, archives, and more to Discover packages and libraries Highly scalable data pipelines f…☆107Updated 2 months ago
- Jacked provides organizations with a more comprehensive look at their application to take calculated actions and create a better security…☆103Updated 2 months ago
- Offensive Terraform Website☆45Updated 4 years ago
- Slack alert bot for matching Github Audit Events☆10Updated 10 months ago
- Is your AWS perimeter secure? Use Powerpipe and Steampipe to check your AWS accounts for public resources, resources shared with untrust…☆112Updated 2 weeks ago
- Identify all permitted data paths originating from the Internet to Network Interfaces within AWS Accounts across the entire AWS Organizat…☆40Updated 2 years ago
- PolicyGlass allows you to analyse one or more AWS policies' effective permissions in aggregate, by restating them in the form of PolicySh…☆60Updated 3 years ago
- sgCheckup generates nmap output based on scanning your AWS Security Groups for unexpected open ports.☆82Updated 4 years ago
- OSCAL SSP content for technologies shipped by Red Hat☆15Updated 2 years ago
- CloudSplaining on AWS Managed Policies☆44Updated last week
- ☆16Updated 2 years ago
- AWSXenos will list all the trust relationships in all the IAM roles, S3 buckets, and more☆64Updated 6 months ago
- IAM-Deescalate helps mitigate privilege escalation risk in AWS identity and access management (IAM)☆98Updated 3 years ago
- A tool for quickly evaluating IAM permissions in AWS.☆73Updated last year
- Scan publicly accessible assets on your AWS cloud environment☆136Updated 3 months ago
- Are AWS Well-Architected best practices being followed? Use Powerpipe and Steampipe to check if your AWS accounts are following best prac…☆19Updated last month
- A meta-database collecting resources that compile lists of breaches☆20Updated 10 months ago
- Compares and analyzes GCP IAM roles.☆77Updated 6 months ago
- A Golang program to rotate AWS & GCP account keys☆65Updated 4 months ago
- Coalfire AWS RAMP/pak Reference Architecture☆36Updated last year
- The golden AMI pipeline enables creation, distribution, verification, launch-compliance, and decommissioning of the golden AMI out of the…☆11Updated 5 years ago
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.☆16Updated 4 years ago
- rpCheckup is an AWS resource policy security checkup tool that identifies public, external account access, intra-org account access, …☆162Updated 4 years ago
- ☆114Updated last month
- ☆41Updated last month
- NIST OSCAL SDK and CLI☆38Updated 5 years ago
- https://breaches.cloud☆42Updated 11 months ago
- A collection of 2020 artifacts describing the major pain points, vulnerabilities and concerns with Cloud Security.☆19Updated 4 years ago
- A curated list of policy-as-code resources like blogs, videos, and tools to practice on for learning Policy-as-Code.☆197Updated last year
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆32Updated 11 months ago