octodemo / advanced-security-terraformLinks
Vulnerable Terraform Projects - Fork of https://github.com/bridgecrewio/terragoat
☆15Updated last year
Alternatives and similar repositories for advanced-security-terraform
Users that are interested in advanced-security-terraform are comparing it to the libraries listed below
Sorting:
- OWASP Foundation Web Respository☆98Updated 7 months ago
- Count distinct contributor of Snyk watched repos across several SCM☆32Updated 2 weeks ago
- OWASP Foundation Web Respository☆55Updated 2 years ago
- GitHub action to scan container images with Palo Alto Networks' Prisma Cloud☆59Updated 5 months ago
- Examples of Custom Secret Scanning Patterns☆164Updated this week
- https://breaches.cloud☆42Updated 10 months ago
- Rapidly apply hundreds of security controls in Azure☆184Updated 4 months ago
- An AWS IAM policy statement parser and query tool.☆193Updated 2 months ago
- ☆73Updated last month
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated 2 years ago
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆47Updated last year
- Manage a uniform team of security managers for every organization in your enterprise☆18Updated last year
- Summaries, transcripts, key points, and other useful insights from fwd:cloudsec 2025 talks for those of us who don't have time to watch e…☆77Updated 2 months ago
- Threat model for Azure Storage - Library of all the attack scenarios on Azure Storage, and how to mitigate them following a risk-based ap…☆59Updated 2 years ago
- OWASP Low-Code/No-Code Top 10☆73Updated 2 months ago
- Public repository of all things cloud security.☆43Updated 11 months ago
- OWASP Foundation Web Respository☆46Updated 3 months ago
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆103Updated last year
- Azure DevOps extensions from CSE DevOps team☆26Updated 2 years ago
- Threat model for Amazon S3 - Library of all the attack scenarios on Amazon S3, and how to mitigate them following a risk-based approach☆157Updated last year
- A full insecure kubernetes application for testing security tools☆89Updated 4 months ago
- Cross cloud workload identity research and workshops☆41Updated last month
- A collection of 2020 artifacts describing the major pain points, vulnerabilities and concerns with Cloud Security.☆19Updated 4 years ago
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆114Updated last month
- Identify all permitted data paths originating from the Internet to Network Interfaces within AWS Accounts across the entire AWS Organizat…☆40Updated last year
- ☆121Updated 3 months ago
- The Prisma Cloud CLI is a command line interface for Prisma Cloud by Palo Alto Networks.☆42Updated 5 months ago
- Prisma Cloud docs☆81Updated last year
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆71Updated last year
- Examples of various Entra ID scenarios in Terraform☆17Updated 11 months ago