kmcquade / terraform-deployment-pentesting
Bits of Terraform that you can use to do bad things in CI/CD pipelines that run Terraform
β10Updated 4 years ago
Alternatives and similar repositories for terraform-deployment-pentesting:
Users that are interested in terraform-deployment-pentesting are comparing it to the libraries listed below
- GCP CSPM using Google Sheetsβ34Updated 8 months ago
- ποΈ STRIDE vs. ASVS equivalence tableβ75Updated 5 months ago
- Audit log wall of shame.β41Updated 4 months ago
- Knowledge Report Alert & Normalization Generatorβ27Updated 11 months ago
- Compares and analyzes GCP IAM roles.β77Updated 8 months ago
- β65Updated 9 months ago
- Convert cloudtrail data to MITRE ATT&CK Sightingsβ79Updated 2 years ago
- Slack bot which promotes Defense in Depth/Zero Trust security practicesβ24Updated 2 years ago
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflowsβ82Updated last week
- AWS EKS Cluster Forensicsβ23Updated 3 years ago
- β14Updated 2 years ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.β56Updated 3 years ago
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.β30Updated 4 months ago
- Automation associated with our talk: Attacking and Defending Infrastructure with Terraformβ16Updated 2 years ago
- β28Updated 4 years ago
- pocket guide for core detection engineering conceptsβ27Updated last year
- Updated incident response generator for training classesβ43Updated 3 years ago
- Holds the public Hacking the Cloud CTFs.β54Updated 11 months ago
- A CLI that scans for sensitive data in source codeβ13Updated last year
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for preβ¦β48Updated 3 months ago
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.β110Updated 4 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.β76Updated 2 years ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accountsβ60Updated last year
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation oβ¦β91Updated last year
- Clean accounts over permissions in GCP infra at scaleβ71Updated last year
- Protect against subdomain takeoverβ92Updated 8 months ago
- AWS SSO serverless phishing API.β31Updated 3 years ago
- Generates runbooks for GuardDuty findingsβ35Updated 7 months ago
- These are tools we released with our 2020 defcon/blackhat talk https://www.youtube.com/watch?v=Ml09R38jpokβ170Updated 2 weeks ago