databricks / security-bucket-brigade
☆31Updated last year
Related projects: ⓘ
- Assorted tools for security-related task for git repositories☆59Updated 2 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆74Updated 2 years ago
- ☆125Updated 2 months ago
- Lightspin AWS IAM Vulnerability Scanner☆96Updated 3 years ago
- Jekyll Files for cloudsecwiki.com☆49Updated 3 years ago
- ☆43Updated 3 years ago
- Fetch the details of assets hosted on AWS.☆85Updated 9 months ago
- A colorful cross-platform python script to test misconfigurations of AWS S3 buckets both through authenticated and unauthenticated checks…☆39Updated 3 years ago
- sgCheckup generates nmap output based on scanning your AWS Security Groups for unexpected open ports.☆81Updated 3 years ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆138Updated 3 years ago
- WAF bypass PoC☆43Updated 11 months ago
- ☆22Updated 2 years ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆132Updated 4 years ago
- Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/)☆87Updated last year
- Opsec considerations for each AWS GuardDuty finding type.☆22Updated 3 years ago
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.☆107Updated 3 years ago
- Research on the enumeration of IAM permissions without logging to CloudTrail☆60Updated 3 years ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆61Updated 11 months ago
- ☆108Updated last year
- 'Continuous' AWS perimeter monitoring: Periodically scan internet facing AWS resources to detect misconfigured services.☆61Updated 5 years ago
- Offensive Terraform Website☆44Updated 3 years ago
- ☆30Updated this week
- AWS Security Checks☆36Updated 6 years ago
- Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS).☆122Updated last year
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆196Updated 2 months ago
- Pull secrets from an AWS environment☆68Updated 4 years ago
- Serverless Workshop☆16Updated last year
- A walkthrough of security controls for a serverless architecture via a demo application☆11Updated 2 years ago
- ☆36Updated 3 years ago
- Hide from the InstanceCredentialExfiltration GuardDuty finding by using VPC Endpoints☆112Updated 11 months ago