lacework-dev / Cloud-HunterLinks
Dynamically generate and hunt with Lacework LQL queries quickly and efficiently
☆27Updated 2 years ago
Alternatives and similar repositories for Cloud-Hunter
Users that are interested in Cloud-Hunter are comparing it to the libraries listed below
Sorting:
- Convert cloudtrail data to MITRE ATT&CK Sightings☆82Updated 3 years ago
- ☆30Updated 3 weeks ago
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events i…☆51Updated 2 months ago
- Generates runbooks for GuardDuty findings☆38Updated last year
- AWS SSO Reporter☆55Updated 9 months ago
- https://breaches.cloud☆42Updated last year
- ☆31Updated last year
- ☆52Updated last year
- Compares and analyzes GCP IAM roles.☆78Updated 10 months ago
- Collect IAM information from all your AWS organization, accounts, and resources.☆84Updated this week
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61Updated 2 years ago
- Security Alert Decoration☆27Updated 6 months ago
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆172Updated 2 weeks ago
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securit…☆37Updated last year
- ☆42Updated 6 months ago
- Knowledge Report Alert & Normalization Generator☆26Updated last month
- IAM-Deescalate helps mitigate privilege escalation risk in AWS identity and access management (IAM)☆98Updated 3 years ago
- GCP CSPM using Google Sheets☆38Updated 10 months ago
- ☆70Updated last year
- Cloud Commotion intends to cause chaos to simulate security incidents☆145Updated last year
- Coalfire AWS RAMP/pak Reference Architecture☆37Updated last year
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆97Updated last week
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o …☆101Updated 2 years ago
- ☆46Updated last year
- Offensive Terraform Website☆45Updated 5 years ago
- ☆65Updated last year
- AWSXenos will list all the trust relationships in all the IAM roles, S3 buckets, and more☆64Updated 11 months ago
- CloudSplaining on AWS Managed Policies☆44Updated 5 months ago
- ☆124Updated 8 months ago
- Clean accounts over permissions in GCP infra at scale☆71Updated 2 years ago