oak9io / tython
☆41Updated this week
Related projects: ⓘ
- A lightweight library to sanitize data provided to AI tools☆26Updated last year
- This repository includes cloud security policies for IaC and live resources.☆39Updated 3 months ago
- A full insecure kubernetes application for testing security tools☆41Updated last week
- The Amazon Elastic Kubernetes Service (EKS) Creation Engine (ECE) is a Python command-line program created by the Lightspin Office of the…☆40Updated last year
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆93Updated 2 months ago
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by use…☆65Updated last year
- ☆38Updated this week
- ☆30Updated 2 months ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆55Updated last year
- Tool for obfuscating and deobfuscating data.☆60Updated 6 months ago
- Clean accounts over permissions in GCP infra at scale☆70Updated last year
- ☆163Updated 3 months ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆165Updated 7 months ago
- ☆33Updated 2 months ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆56Updated last year
- OWASP Foundation Web Respository☆52Updated last year
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆42Updated 8 months ago
- ☆27Updated this week
- Export Fortify vulnerability data to GitHub, GitLab, SonarQube and more☆23Updated 3 months ago
- A schema and set of tools for using SQL to query cloud infrastructure.☆66Updated 2 years ago
- Cloud Security Posture security policies☆29Updated last week
- https://breaches.cloud☆36Updated 2 months ago
- Coalfire AWS RAMP/pak Reference Architecture☆35Updated 3 weeks ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Updated 2 years ago
- ☆60Updated 6 months ago
- ☆106Updated 3 months ago
- a tool to audit the istio service mesh☆173Updated 2 years ago
- IAM-Deescalate helps mitigate privilege escalation risk in AWS identity and access management (IAM)☆94Updated 2 years ago
- The SOCless automation framework☆131Updated 3 weeks ago
- Whole-infrastructure automation tooling for AWS☆41Updated 2 months ago