guardian / aws-pen-test-formLinks
Tool to generate info for the AWS penetration testing request form
☆19Updated 8 years ago
Alternatives and similar repositories for aws-pen-test-form
Users that are interested in aws-pen-test-form are comparing it to the libraries listed below
Sorting:
- Tenable.io SDK offers a scalable and safe way to integrate with the Tenable.io platform.☆83Updated 5 years ago
- Terraform stack to deploy ELK Threat Hunting on Amazon AWS.☆89Updated 6 years ago
- for AWS Security material☆249Updated 3 years ago
- An attempt at a Packer template to build an HVM Kali AMI that is identical to a Kali install using the official ISO.☆12Updated 9 years ago
- Proof of Concept Zappa Based AWS Persistence and Attack Platform☆39Updated 5 years ago
- Continuous Integration and Development ExploiteR☆86Updated 2 years ago
- Various AWS Automation Scripts☆144Updated 7 years ago
- A number of Recipes for AWS☆192Updated 6 years ago
- AWS risky security change detector based on EDDA.☆82Updated 6 years ago
- All Day DevOps - Automated Infrastructure Security Monitoring and Defence (ELK + AWS Lambda)☆24Updated 8 years ago
- AWS Auditing & Hardening Tool☆710Updated 5 years ago
- ☆141Updated last year
- Risu is Nessus parser, that converts the generated reports into a ActiveRecord database, this allows for easy report generation and vulne…☆63Updated 3 weeks ago
- Small Node CLI tool to extract active contributors on repos and orgs☆10Updated 2 years ago
- A collection of Ansible roles for automating infosec builds.☆92Updated 7 years ago
- Google Cloud Platform Security Tool☆234Updated 6 years ago
- A Slack bot to add security info to messages containing URLs, hashes and IPs☆71Updated last year
- AMIRA: Automated Malware Incident Response & Analysis☆151Updated 8 months ago
- Content for 'JIRA Risk Project' book published at LeanPub☆57Updated 7 years ago
- ☆10Updated 5 years ago
- Python module for evaluation of AWS account best practices around incident handling readieness.☆55Updated 5 years ago
- ☆67Updated 8 years ago
- Enforce ownership and data security within AWS☆448Updated 4 years ago
- dockscan is security vulnerability and audit scanner for Docker installations☆219Updated 9 years ago
- Blazing CloudTrail since 2018☆138Updated 6 years ago
- Exfiltrate files via DNS☆95Updated 12 years ago
- Dashboard to collect, analyze, and respond to reported phishing emails.☆293Updated 2 years ago
- Example detection of compromise credentials in AWS☆122Updated 7 years ago
- Kali Linux, built from initial Debian Jessie, using Vagrant, for deployment to Amazon☆17Updated 8 years ago
- Scripts for making Hubot a CND Sidekick☆59Updated 9 years ago