lacework-dev / Cloud-Hunter
Dynamically generate and hunt with Lacework LQL queries quickly and efficiently
☆27Updated last year
Alternatives and similar repositories for Cloud-Hunter:
Users that are interested in Cloud-Hunter are comparing it to the libraries listed below
- Convert cloudtrail data to MITRE ATT&CK Sightings☆79Updated 2 years ago
- Compares and analyzes GCP IAM roles.☆77Updated 8 months ago
- AWS SSO Reporter☆54Updated last year
- ☆26Updated 3 months ago
- Safer AWS SCP deployments via real-time monitoring☆50Updated last year
- GCP CSPM using Google Sheets☆34Updated 8 months ago
- Generates runbooks for GuardDuty findings☆35Updated 7 months ago
- AWS docs, guides, and other tools☆76Updated 2 years ago
- 'Continuous' AWS perimeter monitoring: Periodically scan internet facing AWS resources to detect misconfigured services.☆64Updated 5 years ago
- ☆112Updated last month
- Coalfire AWS RAMP/pak Reference Architecture☆36Updated 5 months ago
- Scripts to quickly fix security and compliance issues☆25Updated last year
- Security Alert Decoration☆26Updated 3 weeks ago
- Manage GuardDuty At Enterprise Scale☆22Updated 4 years ago
- Detect publicly accessible Lambda Function URLs in your AWS account☆9Updated 2 years ago
- ☆65Updated 9 months ago
- ☆28Updated 3 months ago
- https://breaches.cloud☆38Updated 4 months ago
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆140Updated this week
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆180Updated 5 months ago
- CloudSplaining on AWS Managed Policies☆41Updated this week
- ☆14Updated 2 years ago
- Deliberately vulnerable AWS resources for security assessment demos☆31Updated 2 years ago
- Audit log wall of shame.☆41Updated 4 months ago
- ☆154Updated last year
- A small set of scripts to summarize AWS Security Groups, and generate visualizations of the rules.☆62Updated 4 years ago
- Listing of resources for example AWS Service Control Policies (SCPs)☆16Updated last year
- IAM-Deescalate helps mitigate privilege escalation risk in AWS identity and access management (IAM)☆98Updated 2 years ago
- ☆38Updated last year
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆53Updated last year