naman16 / AWS-Security-Guardrails-TF
☆29Updated 4 months ago
Alternatives and similar repositories for AWS-Security-Guardrails-TF:
Users that are interested in AWS-Security-Guardrails-TF are comparing it to the libraries listed below
- Generates runbooks for GuardDuty findings☆35Updated 8 months ago
- https://breaches.cloud☆38Updated 5 months ago
- ☆47Updated 4 months ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆60Updated last year
- Safer AWS SCP deployments via real-time monitoring☆50Updated last year
- ☆38Updated 4 months ago
- Convert cloudtrail data to MITRE ATT&CK Sightings☆79Updated 2 years ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆30Updated 5 months ago
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆30Updated 5 months ago
- Scripts to quickly fix security and compliance issues☆26Updated last year
- ☆29Updated 4 months ago
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆51Updated 4 months ago
- AWS honey token manager☆87Updated 7 months ago
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆46Updated last year
- ☆43Updated 2 months ago
- ☆112Updated 2 months ago
- A tool to uncover undocumented APIs from the AWS Console.☆98Updated 4 months ago
- Compares and analyzes GCP IAM roles.☆77Updated last week
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆138Updated 2 months ago
- Repository to archive AWS Documentation for local use☆41Updated 5 months ago
- This application was built to help reduce the amount of time it takes to review AWS Lambda code.☆60Updated 4 months ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated last year
- Deliberately vulnerable AWS resources for security assessment demos☆31Updated 2 years ago
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆52Updated last month
- Cloud Commotion intends to cause chaos to simulate security incidents☆145Updated 9 months ago
- AWS SSO Reporter☆54Updated last year
- HashiCorp-relevant rules for the Semgrep code analysis tool☆39Updated last year
- ☆41Updated last year