jonrau1 / 100-Days-of-CloudLinks
#100DaysOfCloud #100DaysOfCyberSecurity snippets starting from 28 SEPT 2022
☆14Updated 2 years ago
Alternatives and similar repositories for 100-Days-of-Cloud
Users that are interested in 100-Days-of-Cloud are comparing it to the libraries listed below
Sorting:
- Summaries, transcripts, key points, and other useful insights from AWS re:inforce 2025 talks for those of us who don't have time to watch…☆60Updated this week
- A guide to simplify the process of evaluating Datadog's Cloud SIEM security capabilities to detect AWS threats.☆20Updated last year
- A collection I've created of walkthroughs and related code to build and deploy AWS security-related services, use cases, and architectura…☆24Updated last month
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated last year
- ☆15Updated 3 years ago
- ThreatModel for Azure Storage - Library of all the attack scenarios on Azure Storage, and how to mitigate them following a risk-based app…☆59Updated 2 years ago
- AWS Sentinel is a command-line security scanner for AWS resources. It helps identify common security issues in your AWS account☆29Updated 2 months ago
- A collection of DoD and Federal Government Cloud Computing Resources☆48Updated 4 years ago
- Cloud Roles Database☆36Updated 2 years ago
- GitHub action to scan container images with Palo Alto Networks' Prisma Cloud☆57Updated 3 months ago
- Create custom auto-remediation solutions using serverless functions in the cloud.☆53Updated 2 years ago
- Public repository of all things cloud security.☆42Updated 9 months ago
- A cheatsheet containing AWS CloudTrail events that can be used for Incident Response purposes or Detection Engineering.☆74Updated last year
- ☆65Updated 10 months ago
- The Amazon Elastic Kubernetes Service (EKS) Creation Engine (ECE) is a Python command-line program created by the Lightspin Office of the…☆40Updated 2 years ago
- ThreatModel for Amazon S3 - Library of all the attack scenarios on Amazon S3, and how to mitigate them following a risk-based approach☆154Updated last year
- ☆12Updated last year
- https://breaches.cloud☆40Updated 8 months ago
- ☆1Updated 9 months ago
- A list of resources blogs talks material about DevSecOps☆94Updated 3 years ago
- Repository for storing code for O'Reilly book☆33Updated last year
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆101Updated last year
- List of all the Publicly disclosed vulnerabilities of Public Cloud Provider like Amazon Web Services (AWS), Microsoft Azure, Google Cloud…☆362Updated 2 years ago
- An AWS IAM policy statement parser and query tool.☆188Updated this week
- A collection of projects supporting AWS Integration☆156Updated last month
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆97Updated last year
- This solutions facilitates rapid deployment of Prowler, full AWS Organization analysis, and finding processing as part of a security post…☆59Updated 3 weeks ago
- ☆117Updated last month
- Adaptive AWS Zero Trust Policy made easy: Auto-generate least-privilege policies based on user activity in real time! Accelerate the adop…☆76Updated last year
- A tool for AWS incident response, that allows for enumeration, acquisition and analysis of data from AWS environments for the purpose of …☆192Updated 8 months ago