mitiga / log4shell-cloud-scannerLinks
we are providing DevOps and security teams script to identify cloud workloads that may be vulnerable to the Log4j vulnerability(CVE-2021-44228) in their AWS account. The script enables security teams to identify external-facing AWS assets by running the exploit on them, and thus be able to map them and quickly patch them
☆13Updated 4 years ago
Alternatives and similar repositories for log4shell-cloud-scanner
Users that are interested in log4shell-cloud-scanner are comparing it to the libraries listed below
Sorting:
- A multi-cloud setup of managed Kubernetes Clusters.☆20Updated last year
- Command line to list and IP whitelist active AWS credentials☆15Updated 3 years ago
- Automated determination of which AWS services run where☆20Updated this week
- *READY TO USE* Terraform baseline for implementing essential AWS security best practices, including Organizations, SSO, MFA, SCPs, Budget…☆25Updated last year
- DNSmetrics connects to your accounts at multiple managed DNS providers using their APIs and emits standardized metrics in statsd format f…☆14Updated 6 years ago
- A DRY approach to tagging Terraform resources☆24Updated 2 years ago
- Instance type offerings for EC2 instances. Automatic updates weekly.☆15Updated 4 years ago
- Google Cloud Platform (GCP) configuration scanning tool☆16Updated last week
- 🧬 Collection of Makefiles and test scripts to facilitate testing Terraform modules, Kubernetes resources, Helm charts, and more☆31Updated 3 months ago
- Kubernetes admission webhook that uses cosign verify to check the subject and issuer of the image matches what you expect☆24Updated this week
- A terraform REPL.☆32Updated 2 years ago
- Validate all your Customer IAM Policies against AWS Access Analyzer - Policy Validation☆43Updated 4 years ago
- AWS container security survey 2020☆11Updated 5 years ago
- The original AWS security enforcer™☆61Updated 6 years ago
- ☆20Updated 2 years ago
- Dynamic Application Security Testing (DAST) for Cloud☆44Updated 3 years ago
- Try-it-yourself examples of deploying ScaleFT in AWS with Terraform☆18Updated 5 years ago
- Repository containing a set of policies for aws resources created with terraform☆12Updated 6 years ago
- Sharable Config Presets for Renovatebot, especially useful for DevOps folks☆51Updated last week
- Run common terramate commands in a single GitHub action☆17Updated this week
- Privateer is a plugin-based framework to validate the status of deployed resources.☆16Updated 3 weeks ago
- Automatically close AWS Accounts when moved to a specific Organizational Unit, such as SuspendedOU or ToBeDeletedOU or BlackHole 😛☆14Updated 3 years ago
- Base infrastructure for future DevSecOps environment in AWS☆25Updated 5 years ago
- Darkbit Cloud Security Tools☆25Updated 5 years ago
- Sample code snippets for consuming the CloudSploit API☆13Updated 2 years ago
- An Incident Management Process / Post Mortem Template☆31Updated 7 years ago
- A Security Results Viewer for the web with storage, teams and history☆35Updated 3 years ago
- Slack alert bot for matching Github Audit Events☆10Updated last year
- GitSwitch, the ultimate solution for managing multiple Git users across different vendors☆31Updated last year
- A CLI application to accompany on your terraform module journey and sharing your burden of module dependency updates, just as one brave H…☆20Updated last year