Security Scanner based on CIS benchmark 1.1 inspired by Scout2
☆54Feb 15, 2023Updated 3 years ago
Alternatives and similar repositories for azure_cis_scanner
Users that are interested in azure_cis_scanner are comparing it to the libraries listed below
Sorting:
- Rapidly apply hundreds of security controls in Azure☆183May 1, 2025Updated 10 months ago
- ☆10May 12, 2022Updated 3 years ago
- Using Microsoft 365 App Passwords for persistence☆23Sep 2, 2020Updated 5 years ago
- Security Cloud Assessment Tool☆11Jun 28, 2020Updated 5 years ago
- Modular Kubernetes lab which provides an easy and streamlined way to deploy a test cluster with support for different components.☆53Oct 2, 2025Updated 5 months ago
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆11Dec 20, 2021Updated 4 years ago
- ☆34Jul 11, 2019Updated 6 years ago
- A terraform module to create a VPC with secure default configurations.☆17Jan 18, 2022Updated 4 years ago
- ☆17Aug 27, 2022Updated 3 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Sep 25, 2017Updated 8 years ago
- (WIP) CIS Microsoft Azure Foundations Benchmark☆17Dec 14, 2025Updated 2 months ago
- Unlocking Serverless Computing to Assess Security Controls☆262Mar 15, 2024Updated last year
- An example of a vulnerable slack bot that runs in AWS lambda.☆19Jul 15, 2017Updated 8 years ago
- CEF ( Common Event Format ) exporting app for Splunk written in python☆15Oct 23, 2013Updated 12 years ago
- Keeping your infrastructure clean since 2018☆12Mar 14, 2024Updated last year
- ☆157Jul 8, 2023Updated 2 years ago
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Nov 25, 2019Updated 6 years ago
- A scripted library of hacking techniques.☆18Jul 18, 2018Updated 7 years ago
- Automate generation of syzkaller's grammar☆16Nov 1, 2022Updated 3 years ago
- A curated list of awesome AWS IAM tools, libraries guides, blogs, and other resources☆17Jan 5, 2020Updated 6 years ago
- Create Logstash events from the Okta API!☆19Nov 29, 2022Updated 3 years ago
- Kernel assisted microcontainer packer☆24Feb 15, 2019Updated 7 years ago
- Insights and change tracking on Microsoft Entra ID Service Principals (Enterprise Applications, Applications and Managed Identities)☆248Apr 30, 2025Updated 10 months ago
- Extensible Azure Security Tool - Documentation☆83Jun 1, 2023Updated 2 years ago
- ☆23Feb 20, 2023Updated 3 years ago
- Welcome to OpenDevSecOps! Our mission is to deliver highly-resilient, readily-available and free defensive and offensive devops security …☆21Jan 29, 2019Updated 7 years ago
- Azure Red Team tool for graphing Azure and Azure Active Directory objects☆1,685Jan 8, 2024Updated 2 years ago
- ☆20Jan 19, 2026Updated last month
- List of Red Team Repositories☆17Feb 26, 2019Updated 7 years ago
- ☆22Aug 29, 2023Updated 2 years ago
- Scripts to define your azure security governance as code and avoid manual settings of permissions and avoiding configuration drift☆21May 11, 2021Updated 4 years ago
- Detect x86 shellcode in files and traffic.☆25Jun 12, 2018Updated 7 years ago
- ☆43Aug 30, 2018Updated 7 years ago
- Glue workflow to convert CloudTrail logs to Athena-friendly Parquet format☆48Apr 25, 2024Updated last year
- HEVD Multi-Exploit by m_101☆23Jun 24, 2018Updated 7 years ago
- 🎯 Vulnerability Pryer - Prying context into your vulnerability data☆21Feb 24, 2026Updated last week
- Control Flow Guard Teleportation demo☆23Jul 28, 2019Updated 6 years ago
- Cloud Security Suite - One stop tool for auditing the security posture of AWS/GCP/Azure infrastructure.☆1,167Dec 8, 2022Updated 3 years ago
- A Cloud Forensics Powershell module to run threat hunting playbooks on data from Azure and O365☆790Oct 29, 2022Updated 3 years ago