google / localtoastLinks
☆115Updated 2 months ago
Alternatives and similar repositories for localtoast
Users that are interested in localtoast are comparing it to the libraries listed below
Sorting:
- Compares and analyzes GCP IAM roles.☆77Updated 7 months ago
- Attaché provides an emulation layer for Cloud Provider IMDS APIs☆60Updated last year
- HashiCorp-relevant rules for the Semgrep code analysis tool☆42Updated 2 years ago
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆32Updated last year
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆112Updated last week
- A tool to check the security settings of Github Organizations.☆72Updated 2 years ago
- ☆56Updated last month
- GCP CSPM using Google Sheets☆37Updated 6 months ago
- A place for the InfoSec community to share and celebrate real stories of organizations successfully using SBOMs (and other bills of mater…☆43Updated last year
- Automated testing, generation & manipulation of #osquery packs☆73Updated last year
- Template Go app repo with local test/lint/build/vulnerability check workflow, and on tag image test/build/release pipelines, with ko gene…☆104Updated last year
- kntrl is an eBPF based runtime agent that monitors and prevents anomalous behaviour defined by you on your pipeline. kntrl achieves this …☆120Updated 3 weeks ago
- The security workflow engine!☆126Updated this week
- Documenting your Threat Models with HCL☆433Updated last week
- Clean accounts over permissions in GCP infra at scale☆71Updated 2 years ago
- Useful scripts, Docker images, docker-compose apps, and Terraform modules.☆151Updated last week
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆177Updated 11 months ago
- ☆73Updated this week
- Supply-Chain Firewall (SCFW) is a tool for preventing the installation of malicious npm and PyPI packages☆168Updated last week
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by use…☆73Updated 2 years ago
- prel(iminary) is an application that temporarily assigns Google Cloud IAM Roles and includes an approval process.☆46Updated last week
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆111Updated 9 months ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated 2 years ago
- ☆122Updated 4 months ago
- vexctl is a tool to attest VEX impact statements☆45Updated 2 years ago
- a tool to audit the istio service mesh☆173Updated 4 years ago
- Harness the security superpowers of your cloud asset inventory☆11Updated last year
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆105Updated last year
- This repo. is archived. The utility is now at: https://github.com/CycloneDX/sbom-utility☆60Updated 2 years ago
- AWS honey token manager☆89Updated last year