christophetd / fun-with-vpc-endpoints
☆14Updated last year
Related projects ⓘ
Alternatives and complementary repositories for fun-with-vpc-endpoints
- Compares and analyzes GCP IAM roles.☆76Updated 5 months ago
- AWSXenos will list all the trust relationships in all the IAM roles, S3 buckets, and more☆61Updated 5 months ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆57Updated last year
- Repository to archive AWS Documentation for local use☆38Updated 3 weeks ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Updated 2 years ago
- Generates runbooks for GuardDuty findings☆34Updated 4 months ago
- ☆23Updated last month
- A PoC to Simulate Ransomware Attack on AWS Environment☆26Updated 3 weeks ago
- ☆42Updated 2 weeks ago
- ☆66Updated 5 months ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆58Updated last year
- Slack bot which promotes Defense in Depth/Zero Trust security practices☆24Updated last year
- Audit log wall of shame.☆41Updated 3 weeks ago
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆43Updated 6 months ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆40Updated last month
- ☆37Updated 9 months ago
- Updated incident response generator for training classes☆41Updated 3 years ago
- Research on the enumeration of IAM permissions without logging to CloudTrail☆60Updated 3 years ago
- CloudSplaining on AWS Managed Policies☆41Updated this week
- Collection of incidents resulting from caching issues☆25Updated 3 months ago
- Assess certain AWS network configurations☆11Updated 6 years ago
- Knowledge Report Alert & Normalization Generator☆27Updated 7 months ago
- Public repository of all things cloud security.☆32Updated last month
- AWS SSO Reporter☆54Updated last year
- A collection of models for organizing, prioritizing, and understanding cybersecurity and information risk management concepts.☆19Updated last month
- Convert cloudtrail data to MITRE ATT&CK Sightings☆79Updated 2 years ago
- ☆21Updated this week
- AWS honey token manager☆84Updated 3 months ago