lacework-dev / Cloud-Hunter
Dynamically generate and hunt with Lacework LQL queries quickly and efficiently
☆27Updated last year
Alternatives and similar repositories for Cloud-Hunter:
Users that are interested in Cloud-Hunter are comparing it to the libraries listed below
- Convert cloudtrail data to MITRE ATT&CK Sightings☆80Updated 2 years ago
- Compares and analyzes GCP IAM roles.☆77Updated 2 months ago
- Generates runbooks for GuardDuty findings☆35Updated 10 months ago
- Safer AWS SCP deployments via real-time monitoring☆51Updated last year
- GCP CSPM using Google Sheets☆35Updated last month
- ☆29Updated 6 months ago
- https://breaches.cloud☆39Updated 6 months ago
- Scripts to quickly fix security and compliance issues☆26Updated last year
- AWSXenos will list all the trust relationships in all the IAM roles, S3 buckets, and more☆62Updated 2 months ago
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆31Updated 6 months ago
- AWS SSO Reporter☆54Updated last year
- ☆117Updated last month
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆159Updated last week
- Coalfire AWS RAMP/pak Reference Architecture☆36Updated 8 months ago
- ☆40Updated 6 months ago
- CloudSplaining on AWS Managed Policies☆43Updated this week
- Audit log wall of shame.☆41Updated 6 months ago
- ☆29Updated 6 months ago
- AWS honey token manager☆87Updated 9 months ago
- ☆83Updated 5 years ago
- Security Alert Decoration☆27Updated 2 weeks ago
- Knowledge Report Alert & Normalization Generator☆27Updated last year
- InSpec profile to validate your VPC to the standards of the CIS Amazon Web Services Foundations Benchmark☆78Updated 4 months ago
- ☆65Updated 11 months ago
- The Amazon Elastic Kubernetes Service (EKS) Creation Engine (ECE) is a Python command-line program created by the Lightspin Office of the…☆40Updated 2 years ago
- ☆48Updated 6 months ago
- Clean accounts over permissions in GCP infra at scale☆71Updated 2 years ago
- Finders Keypers: AWS KMS Encryption Key Usage and Blast Radius Finder☆35Updated last week
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆53Updated last year
- IAM-Deescalate helps mitigate privilege escalation risk in AWS identity and access management (IAM)☆98Updated 2 years ago