google / gcp_scanner
A comprehensive scanner for Google Cloud
☆317Updated last month
Alternatives and similar repositories for gcp_scanner:
Users that are interested in gcp_scanner are comparing it to the libraries listed below
- A collection of GCP IAM privilege escalation methods documented by the Rhino Security Labs team.☆359Updated 9 months ago
- GCPGoat : A Damn Vulnerable GCP Infrastructure☆365Updated 2 months ago
- OWASP Kubernetes security and compliance tool [WIP]☆105Updated last year
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆223Updated 4 months ago
- ☆108Updated last week
- A curated list of Awesome Security Challenges.☆177Updated 2 months ago
- Protect against subdomain takeover☆92Updated 7 months ago
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆97Updated last year
- boostsecurityio/lotp☆110Updated last month
- Best practice example for secure and compliant Google Cloud Platform infrastructure☆101Updated 2 years ago
- A tool for preventing the installation of malicious PyPI and npm packages☆108Updated last month
- Community Security Analytics provides a set of community-driven audit & threat queries for Google Cloud☆328Updated 7 months ago
- ☆360Updated 9 months ago
- Eliminate dangling elastic IPs by performing analysis on your resources within all your AWS accounts.☆267Updated 4 months ago
- An open project to list all publicly known cloud vulnerabilities and CSP security issues☆313Updated last week
- Create your own vulnerable by design AWS penetration testing playground☆345Updated 7 months ago
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.☆271Updated 4 months ago
- A full insecure kubernetes application for testing security tools☆64Updated last week
- This repo contains IOC, malware and malware analysis associated with Public cloud☆246Updated 2 months ago
- Take automated actions against threats and vulnerabilities.☆210Updated last year
- ☆110Updated last year
- The Swiss Army Container for Cloud Native Security. Container with all the list of useful tools/commands while hacking and securing Conta…☆267Updated last year
- ☆171Updated last month
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆323Updated last year
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆214Updated 3 weeks ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆63Updated last year
- A deliberately vulnerable Kubernetes cluster☆120Updated last year
- HASH (HTTP Agnostic Software Honeypot)☆133Updated 8 months ago
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆105Updated 3 months ago
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆266Updated last month