Unit testing framework for test driven security of AWS, GCP, Heroku and more.
☆108Jan 22, 2026Updated 2 months ago
Alternatives and similar repositories for frost
Users that are interested in frost are comparing it to the libraries listed below
Sorting:
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Jul 7, 2018Updated 7 years ago
- ☆20Mar 3, 2018Updated 8 years ago
- Blazing CloudTrail since 2018☆138Jan 27, 2019Updated 7 years ago
- Automate the AWS GuardDuty account invitation lifecycle for all of your organizations AWS accounts in all regions as well as aggregate an…☆66Apr 10, 2023Updated 2 years ago
- DEPRECATED - web security checklist for Firefox Services☆78Jan 6, 2021Updated 5 years ago
- AWS managed IAM policies☆16Mar 24, 2022Updated 3 years ago
- ☆84Jun 2, 2021Updated 4 years ago
- Cloud Auxiliary is a python wrapper and orchestration module for interacting with cloud providers☆79Jan 26, 2023Updated 3 years ago
- ☆159Jul 8, 2023Updated 2 years ago
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.☆15Aug 12, 2021Updated 4 years ago
- A continuous security pipeline demo for the AWS DevSecOps Workshop.☆45Jan 7, 2020Updated 6 years ago
- Stand-alone OIDC Access Proxy☆12Nov 1, 2021Updated 4 years ago
- BIG-IP AWS module for the Terraform Registry☆10Feb 10, 2022Updated 4 years ago
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆29Aug 18, 2019Updated 6 years ago
- AWS IAM linting library☆1,111Jan 7, 2026Updated 2 months ago
- The original AWS security enforcer™☆61Mar 6, 2019Updated 7 years ago
- Audit IAM roles and users using Access Advisor data using Python/boto3 SDK and automatically create IAM permissions boundaries to limit a…☆39Sep 8, 2020Updated 5 years ago
- Example detection of compromise credentials in AWS☆122Aug 6, 2018Updated 7 years ago
- Presentations, training modules, and other education materials from Duo Security's Application Security team.☆76Jul 15, 2021Updated 4 years ago
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- This solution uses AWS CDK to simplify the deployment and testing of EKS clusters with customized amazon machine images.☆11Oct 17, 2023Updated 2 years ago
- AWS Identity and Access Management Visualizer and Anomaly Finder☆297Jan 23, 2026Updated last month
- Utilities for programmatic analysis of Cartography data.☆40Mar 2, 2026Updated 2 weeks ago
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆54Dec 9, 2025Updated 3 months ago
- An AWS lambda function that grantsss S3 permissionsss at ssscale.☆14Jan 4, 2018Updated 8 years ago
- Marking instances dirty since 2018☆47Apr 25, 2019Updated 6 years ago
- Relay Workflows☆11Aug 24, 2022Updated 3 years ago
- A serverless, event-driven AWS configuration collection service with configuration versioning.☆94Feb 18, 2021Updated 5 years ago
- ☆66Sep 20, 2021Updated 4 years ago
- The SOCless automation framework☆141Feb 11, 2025Updated last year
- Comet is an alert distribution framework which allows you to distribute alerts all the way to the resource owner with customizable owner …☆59Mar 29, 2022Updated 3 years ago
- Terraform module for Policy Sentry.☆26Nov 10, 2020Updated 5 years ago
- ☆14Aug 5, 2024Updated last year
- Cloud multi-account metadata management tool.☆91Oct 29, 2020Updated 5 years ago
- Lambda function to run cfn_nag in CodePipeline☆11Jun 22, 2021Updated 4 years ago
- Research on the enumeration of IAM permissions without logging to CloudTrail☆60Jun 11, 2021Updated 4 years ago
- A Security Scanner for Go☆26Feb 11, 2019Updated 7 years ago
- Tools to automate AWS Cloud security assessments☆24Mar 26, 2020Updated 5 years ago
- This is the ssh daemon configuration and necessary EC2 instance scripting to enable EC2 Instance Connect. Also included is various packag…☆85Jun 13, 2024Updated last year