google / localtoastLinks
☆112Updated last week
Alternatives and similar repositories for localtoast
Users that are interested in localtoast are comparing it to the libraries listed below
Sorting:
- Compares and analyzes GCP IAM roles.☆77Updated 2 months ago
- ☆54Updated 2 weeks ago
- ☆86Updated this week
- GCP CSPM using Google Sheets☆36Updated last month
- Attaché provides an emulation layer for Cloud Provider IMDS APIs☆55Updated 11 months ago
- Automated testing, generation & manipulation of #osquery packs☆72Updated 7 months ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆95Updated 4 months ago
- HashiCorp-relevant rules for the Semgrep code analysis tool☆41Updated last year
- Protect against subdomain takeover☆92Updated last year
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆172Updated 6 months ago
- vexctl is a tool to attest VEX impact statements☆44Updated 2 years ago
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆31Updated 7 months ago
- a tool to audit the istio service mesh☆173Updated 3 years ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated last year
- A tool to check the security settings of Github Organizations.☆71Updated last year
- Clean accounts over permissions in GCP infra at scale☆71Updated 2 years ago
- An SBOM query language and associated utilities☆54Updated last year
- 🖇️ STRIDE vs. ASVS equivalence table☆76Updated 9 months ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61Updated 2 years ago
- This repo. is archived. The utility is now at: https://github.com/CycloneDX/sbom-utility☆60Updated 2 years ago
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆110Updated last week
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆55Updated 4 months ago
- Audit log wall of shame.☆41Updated 7 months ago
- Documenting your Threat Models with HCL☆427Updated this week
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆101Updated last year
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by use…☆70Updated 2 years ago
- AWS honey token manager☆87Updated 9 months ago
- A tool to create, transform and attest VEX metadata☆137Updated last week
- A place for the InfoSec community to share and celebrate real stories of organizations successfully using SBOMs (and other bills of mater…☆42Updated last year
- ☆74Updated 2 weeks ago