kudelskisecurity / youshallnotpass
YouShallNotPass brings an added level of execution security to mission-critical CI/CD Systems.
☆36Updated 10 months ago
Related projects ⓘ
Alternatives and complementary repositories for youshallnotpass
- HashiCorp-relevant rules for the Semgrep code analysis tool☆37Updated last year
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆40Updated last month
- AWS honey token manager☆84Updated 3 months ago
- A tool to uncover undocumented APIs from the AWS Console.☆80Updated last month
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆79Updated this week
- Static code analyser for backdoors and malicious code in git repos using OpenAI compatible LLM APIs☆69Updated 8 months ago
- EZGHSA is a command-line tool for summarizing and filtering vulnerability alerts on Github repositories.☆35Updated 5 months ago
- Tool for obfuscating and deobfuscating data.☆63Updated 7 months ago
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆43Updated 5 months ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆57Updated last year
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆29Updated 3 weeks ago
- A simple mitmproxy blueprint to intercept HTTPS traffic from app running on Kubernetes☆64Updated 4 months ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆55Updated 7 months ago
- ☆47Updated last year
- A Terraform module that makes it a snap to opt out of all AWS AI/ML data harvesting.☆30Updated 10 months ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆82Updated last month
- Generate datasets of cloud audit logs for common attacks☆181Updated 3 months ago
- Open-source best practices for protecting a secure, sensible cloud platform☆77Updated 2 weeks ago
- FlowAnalyzer is a tool to help in testing and analyzing OAuth 2.0 Flows, including OpenID Connect (OIDC).☆173Updated 4 months ago
- prel(iminary) is an application that temporarily assigns Google Cloud IAM Roles and includes an approval process.☆36Updated this week
- truffleproc — hunt secrets in process memory (TruffleHog & gdb mashup)☆110Updated last year
- ☆42Updated last week
- ☆67Updated 8 months ago
- Secutils.dev is an open-source, versatile, yet simple security toolbox for engineers and researchers☆69Updated last month
- ☆151Updated 2 months ago
- PWN is an open security automation framework that aims to stand on the shoulders of security giants, promoting trust and innovation.☆34Updated last week
- cloudgrep is grep for cloud storage☆319Updated 2 months ago
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆34Updated 2 months ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆57Updated last year
- SecObserve is an open source vulnerability management system for software development and cloud environments. It supports a variety of op…☆93Updated this week