javixeneize / zascaLinks
Yet Another SCA tool
☆13Updated 3 years ago
Alternatives and similar repositories for zasca
Users that are interested in zasca are comparing it to the libraries listed below
Sorting:
- ☆41Updated 4 months ago
- CloudSplaining on AWS Managed Policies☆44Updated 3 months ago
- A collection of 2020 artifacts describing the major pain points, vulnerabilities and concerns with Cloud Security.☆20Updated 4 years ago
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆48Updated last year
- Clean accounts over permissions in GCP infra at scale☆71Updated 2 years ago
- ☆10Updated 3 years ago
- Offensive Terraform Website☆45Updated 5 years ago
- Assess certain AWS network configurations☆12Updated 7 years ago
- ☆14Updated 3 years ago
- This command line tool counts the number of resources in different categories across Amazon regions.☆59Updated 6 years ago
- code reviews to practice☆18Updated 4 years ago
- AWS Quick Start Team☆16Updated last year
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆11Updated 4 years ago
- ☆25Updated last year
- Threat Modeling Manifesto☆29Updated last year
- ZAP Management Scripts☆23Updated this week
- Generates runbooks for GuardDuty findings☆39Updated last year
- Some python scripts I wrote that help with various specialized AWS security things☆10Updated 5 years ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆68Updated 5 months ago
- Deliberately vulnerable AWS resources for security assessment demos☆32Updated 3 years ago
- CDK app to setup an isolated AWS network to experiment with ways of exfiltrating data☆18Updated 4 years ago
- This application was built to help reduce the amount of time it takes to review AWS Lambda code.☆61Updated last year
- A meta-database collecting resources that compile lists of breaches☆20Updated last month
- https://breaches.cloud☆42Updated last year
- Application Security Workflow Automation using Docker and Kubernetes☆23Updated 3 years ago
- Lightspin AWS IAM Vulnerability Scanner☆95Updated 4 years ago
- 🖇️ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.☆75Updated last year
- 'Continuous' AWS perimeter monitoring: Periodically scan internet facing AWS resources to detect misconfigured services.☆64Updated 6 years ago
- Interactive IPython Notebook to demonstrate OWASP ZAP's API and Scripting Functions - OWASP ZAP 2.8.0☆41Updated 3 years ago
- Curated list of security tools☆67Updated last year