cisagov / cyhy_amisLinks
AWS infrastructure for Cyber Hygiene and BOD 18-01 scanning
☆22Updated this week
Alternatives and similar repositories for cyhy_amis
Users that are interested in cyhy_amis are comparing it to the libraries listed below
Sorting:
- Automated pshtt, trustymail, and sslyze scanning☆27Updated last month
- Manage GuardDuty At Enterprise Scale☆22Updated 4 years ago
- Certbot container that stores its configuration in an AWS S3 bucket☆15Updated last month
- SkyWrapper helps to discover suspicious creation forms and uses of temporary tokens in AWS☆108Updated 4 years ago
- 'Continuous' AWS perimeter monitoring: Periodically scan internet facing AWS resources to detect misconfigured services.☆64Updated 6 years ago
- This script is used to generate some basic detections of the aws security services☆71Updated 3 years ago
- Security Scanner based on CIS benchmark 1.1 inspired by Scout2☆53Updated 2 years ago
- DEPRECATED: A set of utilities for converting and working with compliance data for viewing in the heimdall applications☆35Updated 3 years ago
- This command line tool counts the number of resources in different categories across Amazon regions.☆59Updated 5 years ago
- Lightspin AWS IAM Vulnerability Scanner☆96Updated 4 years ago
- AWSATT&CK adds MITRE ATT&CK context and additional logging capabilities to Rhino Security Labs's open-source AWS exploitation framework, …☆45Updated 4 years ago
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.☆110Updated 4 years ago
- Terraform to deploy an assessment environment to the COOL☆16Updated this week
- A Lambda-powered Security Orchestration framework for AWS GuardDuty☆53Updated 5 years ago
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Updated 7 years ago
- A toolset to juggle AWS roles for persistent access☆57Updated last year
- Knowledge Report Alert & Normalization Generator☆27Updated last year
- Run individual configuration, compliance and security controls or full compliance benchmarks for CIS for Zoom using Powerpipe and Steampi…☆66Updated last week
- AWSXenos will list all the trust relationships in all the IAM roles, S3 buckets, and more☆64Updated 5 months ago
- Tools for AWS forensics☆63Updated 9 years ago
- Research on the enumeration of IAM permissions without logging to CloudTrail☆61Updated 4 years ago
- sgCheckup generates nmap output based on scanning your AWS Security Groups for unexpected open ports.☆82Updated 3 years ago
- Fun tools around the EBS Direct API☆19Updated 4 years ago
- Collection of useful Canary tools☆86Updated 2 weeks ago
- Cloud Security Tools☆16Updated 5 years ago
- Hardens Windows Server to CIS Standards☆40Updated 6 years ago
- AWS docs, guides, and other tools☆75Updated 2 years ago
- Assess certain AWS network configurations☆12Updated 7 years ago
- SyntheticSun is a defense-in-depth security automation and monitoring framework which utilizes threat intelligence, machine learning, man…☆78Updated 4 years ago
- Automation of VPC Traffic Mirror Sessions in AWS☆35Updated 10 months ago