gauntlt / gauntlt-starter-kitLinks
Get started with gauntlt right away with examples, install scripts and more
☆51Updated 10 years ago
Alternatives and similar repositories for gauntlt-starter-kit
Users that are interested in gauntlt-starter-kit are comparing it to the libraries listed below
Sorting:
- AWS risky security change detector based on EDDA.☆82Updated 6 years ago
- Security-focused static code analysis for everyone☆81Updated 6 years ago
- INACTIVE - Security Testing Tool☆107Updated 9 years ago
- drydock provides a flexible way of assessing the security of your Docker daemon configuration and containers using editable audit templat…☆65Updated 9 years ago
- Mittn: Security test tool runner for test automation in CI☆195Updated last year
- Hardening and Auditing Tool For Docker Hosts & Containers☆68Updated 10 years ago
- Compliance automation for cloud.gov☆36Updated last month
- Controls for Amazon Web Services☆26Updated 5 years ago
- The original AWS security enforcer™☆61Updated 6 years ago
- Community rules for Commit Watcher☆24Updated 9 years ago
- ☆32Updated 11 years ago
- Development repository for the ossec cookbook☆44Updated last month
- Evident Security Platform Custom Signatures Samples☆28Updated 6 years ago
- ⛔ DEPRECATED: A secure jenkins installation☆17Updated 5 years ago
- Content for 'JIRA Risk Project' book published at LeanPub☆57Updated 7 years ago
- Creates a CloudFormation stack for running Security Monkey☆27Updated 6 years ago
- An actuary is a business professional who analyzes the financial consequences of risk.☆80Updated 7 years ago
- scan s3 buckets for security issues☆85Updated 11 months ago
- ☆83Updated 2 years ago
- cloud.gov security policies and procedures☆25Updated last month
- AWS Metadata Proxy for protection against SSRF☆68Updated 5 years ago
- [DEPRECATED] A quickstart demo for Kolide tools☆52Updated 7 years ago
- Code for installing various security minded tools onto Vagrant powered virtual machines☆172Updated 10 years ago
- Threat Specification Language☆28Updated 9 years ago
- DEPRECATED - Propagate users from Mozilla's Person API to third party systems.☆40Updated 3 years ago
- Logstash Configs used by Netflix☆31Updated 10 years ago
- Deep Security's APIs make it simple to integration with a variety of AWS Services☆19Updated 6 years ago
- this is a demo set of attacks that can be used to get started with gauntlt☆27Updated 9 years ago
- Framework for reviewing and responding to events in AWS Flow Logs using Lambda Function☆46Updated last year
- Auditing & Hardening script for Kubernetes☆45Updated 7 years ago