cisagov / cyhy_amisLinks
AWS infrastructure for Cyber Hygiene and BOD 18-01 scanning
☆23Updated this week
Alternatives and similar repositories for cyhy_amis
Users that are interested in cyhy_amis are comparing it to the libraries listed below
Sorting:
- Automated pshtt, trustymail, and sslyze scanning☆28Updated last week
- Certbot container that stores its configuration in an AWS S3 bucket☆15Updated last week
- SkyWrapper helps to discover suspicious creation forms and uses of temporary tokens in AWS☆108Updated 4 years ago
- DEPRECATED: A set of utilities for converting and working with compliance data for viewing in the heimdall applications☆35Updated 3 years ago
- For use in our Tenable.IO to AWS Security Hub integration☆28Updated 4 months ago
- This command line tool counts the number of resources in different categories across Amazon regions.☆59Updated 6 years ago
- Knowledge Report Alert & Normalization Generator☆26Updated last month
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Updated 7 years ago
- Manage GuardDuty At Enterprise Scale☆22Updated 5 years ago
- 'Continuous' AWS perimeter monitoring: Periodically scan internet facing AWS resources to detect misconfigured services.☆64Updated 6 years ago
- This script is used to generate some basic detections of the aws security services☆72Updated 3 years ago
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.☆111Updated 5 years ago
- Command line tool for working with Panther rules and policies☆47Updated last week
- Tools for AWS forensics☆65Updated 9 years ago
- AWSATT&CK adds MITRE ATT&CK context and additional logging capabilities to Rhino Security Labs's open-source AWS exploitation framework, …☆45Updated 4 years ago
- Updated incident response generator for training classes☆44Updated 4 years ago
- A command line security audit tool for Amazon Web Services☆82Updated 6 years ago
- Cloud Security Tools☆16Updated 5 years ago
- SyntheticSun is a defense-in-depth security automation and monitoring framework which utilizes threat intelligence, machine learning, man…☆82Updated 4 years ago
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆16Updated 6 months ago
- CDK app to setup an isolated AWS network to experiment with ways of exfiltrating data☆18Updated 4 years ago
- Terraform to deploy an assessment environment to the COOL☆16Updated this week
- Lightspin AWS IAM Vulnerability Scanner☆94Updated 4 years ago
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆169Updated this week
- Offensive Terraform Website☆45Updated 5 years ago
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆55Updated last month
- A python module for orchestrating content acquisitions and analysis via amazon ssm.☆58Updated 2 years ago
- A meta-database collecting resources that compile lists of breaches☆21Updated 2 months ago
- Run individual configuration, compliance and security controls or full compliance benchmarks for CIS for Zoom using Powerpipe and Steampi…☆66Updated 5 months ago
- Fun tools around the EBS Direct API☆19Updated 4 years ago