kaakaww / hawkscan-examplesLinks
π A repo of configuration examples for StackHawk's Hawkscan!
β17Updated last week
Alternatives and similar repositories for hawkscan-examples
Users that are interested in hawkscan-examples are comparing it to the libraries listed below
Sorting:
- Sample code snippets for consuming the CloudSploit APIβ13Updated last year
- AWS container security survey 2020β11Updated 4 years ago
- A very vulnerable implementation of a GraphQL API.β16Updated 3 weeks ago
- Collection of dynamic security related helpersβ16Updated 2 years ago
- ZAP Management Scriptsβ23Updated last month
- β19Updated last year
- β16Updated 11 months ago
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.β17Updated last year
- Policy Pipeline : place an SDLC around your compliance documentation with a pipeline that renders policy-as-code to human friendly formatβ¦β11Updated 4 years ago
- β28Updated 2 years ago
- S3Insights is a platform for efficiently deriving security insights about S3 data through metadata analysisβ12Updated 3 weeks ago
- OSCAL SSP content for technologies shipped by Red Hatβ15Updated 2 years ago
- Sysdig labsβ13Updated 2 years ago
- DeployHub Pro Pipeline Status Projectβ11Updated last week
- This repository includes cloud security policies for IaC and live resources.β39Updated last year
- A simple website introducing the CNAB project.β16Updated 2 years ago
- Darkbit Cloud Security Toolsβ25Updated 4 years ago
- NIST OSCAL SDK and CLIβ38Updated 5 years ago
- Use SQL to instantly query secrets and more from source code. Open source CLI. No DB required.β17Updated last month
- The Auditree data gathering and reporting tool.β15Updated 10 months ago
- β16Updated 2 years ago
- For use in our Tenable.IO to AWS Security Hub integrationβ28Updated last month
- β20Updated 6 years ago
- Register your Kubernetes IPs to monitor.shodan.ioβ18Updated 2 years ago
- The Auditree tool for adding external evidence.β11Updated 9 months ago
- TACOS framework structural detailsβ20Updated last month
- DefectDojo Community Contentβ18Updated last month
- βοΈ π€ LLM agent-based simulations to generate benign and malicious Cloud logsβ15Updated 11 months ago
- Markdown Version of the DHS/CISA Secure Software Development Self Attestation Form.β21Updated 2 years ago
- Decision trees generated via Graphviz to inform pragmatic threat modelling.β11Updated 4 years ago