nccgroup / G-Scout
Google Cloud Platform Security Tool
☆234Updated 5 years ago
Alternatives and similar repositories for G-Scout:
Users that are interested in G-Scout are comparing it to the libraries listed below
- A tool for auditing security properties of GCP projects.☆157Updated 6 years ago
- A unified DevSecOps Framework that allows you to go from iterative, collaborative Threat Modeling to Application Security Test Orchestrat…☆278Updated this week
- Python installable command line utiltity for mitigation of host and key compromises.☆344Updated 3 years ago
- A simple file-based scanner to look for potential AWS access and secret keys in files☆90Updated 10 months ago
- for AWS Security material☆246Updated 2 years ago
- OWASP Cloud Security - Enabling conversations through threat and control stories☆179Updated 6 years ago
- A security testing Slackbot built with a Kubernetes backend on the Google Cloud Platform☆165Updated 5 months ago
- Example detection of compromise credentials in AWS☆120Updated 6 years ago
- Remote Memory Acquisition Tool☆245Updated 4 years ago
- Python module for evaluation of AWS account best practices around incident handling readieness.☆55Updated 4 years ago
- A tool for identifying misconfigured CloudFront domains☆349Updated 4 years ago
- Tools for fingerprinting and exploiting Amazon cloud infrastructures☆454Updated 2 years ago
- A Terraform module for GRR: the distributed incident forensics and response framework☆51Updated 4 years ago
- These are tools we released with our 2020 defcon/blackhat talk https://www.youtube.com/watch?v=Ml09R38jpok☆170Updated last week
- Terraform module which provides easy to configure AWS environment for running automated security scanning solutions at scheduled interval…☆45Updated 6 years ago
- Proof of Concept Zappa Based AWS Persistence and Attack Platform☆39Updated 4 years ago
- 'Continuous' AWS perimeter monitoring: Periodically scan internet facing AWS resources to detect misconfigured services.☆64Updated 5 years ago
- Scans Slack for API tokens, credentials, passwords, and more using YARA rules☆38Updated 3 years ago
- Dashboard to collect, analyze, and respond to reported phishing emails.☆287Updated last year
- ☆63Updated 2 years ago
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.☆48Updated 8 years ago
- Monitors Github for leaked secrets☆194Updated 3 months ago
- Kubernetes Auto Analyzer☆191Updated 5 years ago
- Comet is an alert distribution framework which allows you to distribute alerts all the way to the resource owner with customizable owner …☆59Updated 2 years ago
- Find cloud assets that no one wants exposed 🔎 ☁️☆335Updated 4 years ago
- Hayat is a script for report and analyze Google Cloud Platform resources.☆80Updated 5 years ago
- ☆108Updated last year
- Security Payload Unit Test Repository (SPUTR)☆86Updated last year
- AWS Extender CLI is a command-line script to test S3 buckets as well as Google Storage buckets and Azure Storage containers for common mi…☆82Updated 4 years ago
- A tool for automatically gathering sensitive information from exposed Jenkins servers☆103Updated 2 years ago