marco-lancini / utilsLinks
Useful scripts, Docker images, docker-compose apps, and Terraform modules.
☆151Updated last week
Alternatives and similar repositories for utils
Users that are interested in utils are comparing it to the libraries listed below
Sorting:
- Compares and analyzes GCP IAM roles.☆77Updated 7 months ago
- ☆122Updated 5 months ago
- CloudSplaining on AWS Managed Policies☆44Updated last month
- List of vendors that do not allow IMDSv2 enforcement☆143Updated last year
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆112Updated last week
- Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).☆143Updated 5 months ago
- PolicyGlass allows you to analyse one or more AWS policies' effective permissions in aggregate, by restating them in the form of PolicySh…☆60Updated 3 years ago
- A cloud security tool to search and clean up unused AWS access keys, written in Go.☆51Updated 3 years ago
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆105Updated last year
- AWS SSO Reporter☆54Updated 5 months ago
- A tool to check the security settings of Github Organizations.☆72Updated 2 years ago
- Is your AWS perimeter secure? Use Powerpipe and Steampipe to check your AWS accounts for public resources, resources shared with untrust…☆112Updated last month
- Crowdsourced list of sensitive IAM Actions☆154Updated 11 months ago
- Modular Kubernetes lab which provides an easy and streamlined way to deploy a test cluster with support for different components.☆53Updated 3 weeks ago
- A Golang program to rotate AWS & GCP account keys☆65Updated 5 months ago
- GitGoat is an open source tool that was built to enable DevOps and Engineering teams to design and implement a sustainable misconfigurati…☆170Updated 9 months ago
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆34Updated last year
- ☆222Updated last month
- ☆285Updated 2 years ago
- ☆115Updated 2 months ago
- List of known AWS accounts☆237Updated last month
- A collection of documented and undocumented AWS API models☆37Updated 11 months ago
- A place for the InfoSec community to share and celebrate real stories of organizations successfully using SBOMs (and other bills of mater…☆43Updated last year
- This repo is a consolidation of Secure Software Supply Chain resources, such as talks, whitepapers, conferences and more.☆139Updated 3 years ago
- Documenting your Threat Models with HCL☆436Updated last week
- The Amazon Elastic Kubernetes Service (EKS) Creation Engine (ECE) is a Python command-line program created by the Lightspin Office of the…☆41Updated 2 years ago
- IAM-Deescalate helps mitigate privilege escalation risk in AWS identity and access management (IAM)☆98Updated 3 years ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆111Updated 9 months ago
- ☆56Updated last month
- Whole-infrastructure automation tooling for AWS☆42Updated 2 months ago