mitiga / log4shell-cloud-scannerLinks
we are providing DevOps and security teams script to identify cloud workloads that may be vulnerable to the Log4j vulnerability(CVE-2021-44228) in their AWS account. The script enables security teams to identify external-facing AWS assets by running the exploit on them, and thus be able to map them and quickly patch them
☆13Updated 3 years ago
Alternatives and similar repositories for log4shell-cloud-scanner
Users that are interested in log4shell-cloud-scanner are comparing it to the libraries listed below
Sorting:
- A multi-cloud setup of managed Kubernetes Clusters.☆20Updated last year
- Dynamic Application Security Testing (DAST) for Cloud☆44Updated 2 years ago
- 🧬 Collection of Makefiles and test scripts to facilitate testing Terraform modules, Kubernetes resources, Helm charts, and more☆31Updated last week
- Command line to list and IP whitelist active AWS credentials☆15Updated 3 years ago
- A Security Results Viewer for the web with storage, teams and history☆35Updated 2 years ago
- Instance type offerings for EC2 instances. Automatic updates weekly.☆15Updated 4 years ago
- A terraform REPL.☆32Updated 2 years ago
- DNSmetrics connects to your accounts at multiple managed DNS providers using their APIs and emits standardized metrics in statsd format f…☆14Updated 6 years ago
- A DRY approach to tagging Terraform resources☆24Updated 2 years ago
- Testing for the Cloud☆19Updated 5 years ago
- Python library for examining, creating and optimising IAM policies☆22Updated 3 years ago
- Slack alert bot for matching Github Audit Events☆10Updated 10 months ago
- Repository containing a set of policies for aws resources created with terraform☆13Updated 6 years ago
- CLI Tool to help with various automation tasks (mostly all that stuff we cannot accomplish with native terraform)☆19Updated last year
- Sample code snippets for consuming the CloudSploit API☆13Updated last year
- Interrogate your GitHub resources with the help of the world's greatest detectives: Powerpipe + Steampipe + Sherlock.☆41Updated last month
- ☆20Updated 2 years ago
- Modular Kubernetes lab which provides an easy and streamlined way to deploy a test cluster with support for different components.☆53Updated last year
- Kubernetes admission webhook that uses cosign verify to check the subject and issuer of the image matches what you expect☆23Updated last week
- Are AWS Well-Architected best practices being followed? Use Powerpipe and Steampipe to check if your AWS accounts are following best prac…☆19Updated last month
- Traffic and attack generation between simulated microservices.☆35Updated 4 years ago
- AWS container security survey 2020☆11Updated 4 years ago
- Run common terramate commands in a single GitHub action☆17Updated 3 weeks ago
- *READY TO USE* Terraform baseline for implementing essential AWS security best practices, including Organizations, SSO, MFA, SCPs, Budget…☆25Updated 10 months ago
- ☆17Updated last year
- Recursively test a directory tree for Terraform diffs and coverage☆51Updated 2 years ago
- Drift detection and reporting for Terraform.☆27Updated 4 years ago
- Google Cloud Platform (GCP) configuration scanning tool☆16Updated 3 weeks ago
- Automating Terraform with the power of make.☆27Updated 2 months ago
- Validate all your Customer IAM Policies against AWS Access Analyzer - Policy Validation☆43Updated 4 years ago