guardian-nexus / auditkitLinks
AuditKit - Multi-Cloud Compliance Scanner & Evidence Collection
☆238Updated last week
Alternatives and similar repositories for auditkit
Users that are interested in auditkit are comparing it to the libraries listed below
Sorting:
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆83Updated last month
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆100Updated 2 weeks ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆141Updated last year
- An index of publicly available and open-source threat detection rulesets.☆130Updated 9 months ago
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆109Updated 7 months ago
- ☆169Updated 3 months ago
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆41Updated 2 months ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Updated 2 years ago
- A security tool that detects malicious packages from external vulnerability feeds and searches for them in your package registries or art…☆70Updated last month
- ☆75Updated 10 months ago
- Generate datasets of cloud audit logs for common attacks☆230Updated last week
- Create honeypots for cloud environments☆109Updated 3 months ago
- Cloud Offensive Breach and Risk Assessment (COBRA) Tool☆102Updated 8 months ago
- ☆97Updated last month
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆106Updated 2 years ago
- HASH (HTTP Agnostic Software Honeypot)☆141Updated last year
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆113Updated last year
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆215Updated this week
- Automation tool for Windows Deception Host Burn-In☆86Updated last year
- ☆23Updated 10 months ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated last year
- Red Teaming for AI and Cloud☆205Updated last month
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆59Updated 11 months ago
- SecureMCP is a security auditing tool designed to detect vulnerabilities and misconfigurations in applications using the [Model Context P…☆137Updated 7 months ago
- A public collection of detections designed to detect threats associated with the Okta WIC Platform.☆12Updated 2 weeks ago
- ☆191Updated 9 months ago
- 🛡️ VIPER: Stay ahead of threats with AI-driven vulnerability intelligence. Prioritize CVEs effectively using NVD, EPSS, CISA KEV, and Go…☆81Updated 5 months ago
- CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known…☆265Updated last month
- Mapping of open-source detection rules and atomic tests.☆193Updated last year
- Static code analyser for backdoors and malicious code in git repos using OpenAI compatible LLM APIs☆73Updated last year