kbroughton / azure_cis_scannerView external linksLinks
Security Scanner based on CIS benchmark 1.1 inspired by Scout2
☆54Feb 15, 2023Updated 2 years ago
Alternatives and similar repositories for azure_cis_scanner
Users that are interested in azure_cis_scanner are comparing it to the libraries listed below
Sorting:
- Rapidly apply hundreds of security controls in Azure☆183May 1, 2025Updated 9 months ago
- ☆10May 12, 2022Updated 3 years ago
- Azure AD Incident Response☆27Oct 8, 2021Updated 4 years ago
- Using Microsoft 365 App Passwords for persistence☆23Sep 2, 2020Updated 5 years ago
- "RansomPKP" proof of concept.☆11Aug 8, 2016Updated 9 years ago
- Security Cloud Assessment Tool☆11Jun 28, 2020Updated 5 years ago
- Modular Kubernetes lab which provides an easy and streamlined way to deploy a test cluster with support for different components.☆53Oct 2, 2025Updated 4 months ago
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆11Dec 20, 2021Updated 4 years ago
- ☆12Feb 18, 2021Updated 4 years ago
- ☆34Jul 11, 2019Updated 6 years ago
- Upload external IP so you can find your devices elsewhere☆16Mar 25, 2024Updated last year
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Sep 25, 2017Updated 8 years ago
- Security Assessment Report geNerated Automatically☆41Sep 26, 2024Updated last year
- Container Security Verification Standard☆36Mar 28, 2019Updated 6 years ago
- Unlocking Serverless Computing to Assess Security Controls☆262Mar 15, 2024Updated last year
- An example of a vulnerable slack bot that runs in AWS lambda.☆19Jul 15, 2017Updated 8 years ago
- ☆157Jul 8, 2023Updated 2 years ago
- Create Logstash events from the Okta API!☆19Nov 29, 2022Updated 3 years ago
- Kernel assisted microcontainer packer☆24Feb 15, 2019Updated 6 years ago
- A scripted library of hacking techniques.☆18Jul 18, 2018Updated 7 years ago
- A curated list of awesome AWS IAM tools, libraries guides, blogs, and other resources☆17Jan 5, 2020Updated 6 years ago
- An OPA library to develop IT Control policies, for the IBM Cloud☆17Sep 26, 2022Updated 3 years ago
- Insights and change tracking on Microsoft Entra ID Service Principals (Enterprise Applications, Applications and Managed Identities)☆247Apr 30, 2025Updated 9 months ago
- Welcome to OpenDevSecOps! Our mission is to deliver highly-resilient, readily-available and free defensive and offensive devops security …☆21Jan 29, 2019Updated 7 years ago
- ☆23Feb 20, 2023Updated 2 years ago
- Extensible Azure Security Tool - Documentation☆83Jun 1, 2023Updated 2 years ago
- A collection of scripts for assessing Microsoft Azure security☆2,300Oct 29, 2025Updated 3 months ago
- Azure Red Team tool for graphing Azure and Azure Active Directory objects☆1,685Jan 8, 2024Updated 2 years ago
- List of Red Team Repositories☆17Feb 26, 2019Updated 6 years ago
- ☆22Aug 29, 2023Updated 2 years ago
- ☆43Aug 30, 2018Updated 7 years ago
- 🎯 Vulnerability Pryer - Prying context into your vulnerability data☆21Jan 17, 2022Updated 4 years ago
- Control Flow Guard Teleportation demo☆23Jul 28, 2019Updated 6 years ago
- Docker container for datasploit framework☆25Aug 3, 2017Updated 8 years ago
- Cloud Security Suite - One stop tool for auditing the security posture of AWS/GCP/Azure infrastructure.☆1,165Dec 8, 2022Updated 3 years ago
- A Cloud Forensics Powershell module to run threat hunting playbooks on data from Azure and O365☆790Oct 29, 2022Updated 3 years ago
- Jekyll Files for cloudsecwiki.com☆49Sep 16, 2021Updated 4 years ago
- Application Security Workflow Automation using Docker and Kubernetes☆23Dec 11, 2022Updated 3 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Nov 7, 2017Updated 8 years ago