instacart / gadjitLinks
☆27Updated 3 months ago
Alternatives and similar repositories for gadjit
Users that are interested in gadjit are comparing it to the libraries listed below
Sorting:
- Documenting your Threat Models with HCL☆433Updated 3 months ago
- boostsecurityio/poutine☆324Updated 3 weeks ago
- List of known AWS accounts☆228Updated last week
- Cloud Commotion intends to cause chaos to simulate security incidents☆146Updated last year
- A simple threat modeling tool to help humans to reduce time-to-value when threat modeling☆622Updated this week
- A consolidated series of structured data for cloud identity and access management systems, including datasets for AWS, Azure, and Google …☆287Updated this week
- ☆222Updated 3 weeks ago
- ☆376Updated last year
- List of vendors that do not allow IMDSv2 enforcement☆143Updated last year
- ☆114Updated last month
- Example policies demonstrating how to implement a data perimeter on AWS.☆181Updated last week
- Compares and analyzes GCP IAM roles.☆77Updated 6 months ago
- Open Cloud Security Posture Management Engine☆342Updated 3 years ago
- Automate permissions to your cloud and critical applications.☆242Updated last year
- AWS CloudSaga - Simulate security events in AWS☆468Updated this week
- Safer AWS SCP deployments via real-time monitoring☆56Updated last year
- Kickstart and manage your AWS Organization via Terraform☆105Updated last month
- Listing of resources for example AWS Service Control Policies (SCPs)☆17Updated last year
- Threat Designer is a GenerativeAI application designed to automate and streamline the threat modeling process for secure system design.☆148Updated 3 weeks ago
- ☆156Updated 2 years ago
- Resource types that can be publicly exposed on AWS☆328Updated 3 years ago
- ☆375Updated last year
- Segment's Threat Modeling training for our engineers☆245Updated 4 years ago
- Publicly-listed AWS account IDs for easy lookup. Great for cleaning up false positives from unknown Account IDs in Cloudtrail☆39Updated last year
- Automatically compile an AWS Service Control Policy that ONLY allows AWS services that are compliant with your preferred compliance frame…☆225Updated 2 years ago
- SCP management tool☆134Updated last year
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆177Updated 10 months ago
- OWASP Domain Protect - prevent subdomain takeover☆398Updated 9 months ago
- Access Undenied parses AWS AccessDenied CloudTrail events, explains the reasons for them, and offers actionable remediation steps. Open-s…☆264Updated 2 years ago
- Crowdsourced list of sensitive IAM Actions☆154Updated 10 months ago