guardian / aws-pen-test-formLinks
Tool to generate info for the AWS penetration testing request form
☆19Updated 8 years ago
Alternatives and similar repositories for aws-pen-test-form
Users that are interested in aws-pen-test-form are comparing it to the libraries listed below
Sorting:
- for AWS Security material☆248Updated 3 years ago
- Continuous Integration and Development ExploiteR☆86Updated 2 years ago
- AWS risky security change detector based on EDDA.☆82Updated 6 years ago
- Proof of Concept Zappa Based AWS Persistence and Attack Platform☆39Updated 5 years ago
- An attempt at a Packer template to build an HVM Kali AMI that is identical to a Kali install using the official ISO.☆12Updated 8 years ago
- A number of Recipes for AWS☆192Updated 6 years ago
- Google Cloud Platform Security Tool☆234Updated 6 years ago
- An application to assist in the organization and prioritization of software security activities.☆139Updated 4 years ago
- Kubernetes Auto Analyzer☆191Updated 5 years ago
- Terraform stack to deploy ELK Threat Hunting on Amazon AWS.☆89Updated 5 years ago
- Small Node CLI tool to extract active contributors on repos and orgs☆10Updated 2 years ago
- AWS Auditing & Hardening Tool☆710Updated 5 years ago
- A collection of Ansible roles for automating infosec builds.☆93Updated 7 years ago
- it-security related scripts and tools☆25Updated 6 years ago
- All Day DevOps - Automated Infrastructure Security Monitoring and Defence (ELK + AWS Lambda)☆23Updated 8 years ago
- Tenable.io SDK offers a scalable and safe way to integrate with the Tenable.io platform.☆83Updated 5 years ago
- Various AWS Automation Scripts☆144Updated 7 years ago
- Enforce ownership and data security within AWS☆449Updated 4 years ago
- Content for 'JIRA Risk Project' book published at LeanPub☆57Updated 7 years ago
- Mittn: Security test tool runner for test automation in CI☆195Updated last year
- Blazing CloudTrail since 2018☆138Updated 6 years ago
- Tools for fingerprinting and exploiting Amazon cloud infrastructures☆477Updated 2 years ago
- A place for documenting threats and mitigations related to containers orchestrators (Kubernetes, Swarm etc)☆25Updated 7 years ago
- Example detection of compromise credentials in AWS☆122Updated 6 years ago
- Kali Linux, built from initial Debian Jessie, using Vagrant, for deployment to Amazon☆17Updated 8 years ago
- dockscan is security vulnerability and audit scanner for Docker installations☆219Updated 8 years ago
- Python installable command line utiltity for mitigation of host and key compromises.☆347Updated 4 years ago
- Db Database Assessment Tool☆210Updated 7 years ago
- INACTIVE - Security Testing Tool☆107Updated 9 years ago
- AWS Metadata Proxy for protection against SSRF☆68Updated 5 years ago