ovotech / gitoops
all paths lead to clouds
☆637Updated last year
Alternatives and similar repositories for gitoops:
Users that are interested in gitoops are comparing it to the libraries listed below
- OWASP Domain Protect - prevent subdomain takeover☆401Updated last month
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆326Updated last year
- This repo has been replaced by https://www.cloudvulndb.org☆721Updated 2 years ago
- A graph-based tool for visualizing effective access and resource relationships in AWS environments.☆935Updated 2 years ago
- Documenting your Threat Models with HCL☆421Updated 5 months ago
- A honey token manager and alert system for AWS.☆317Updated 3 years ago
- Threat matrix for CI/CD Pipeline☆745Updated 7 months ago
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.☆273Updated 5 months ago
- An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share th…☆267Updated 4 years ago
- Automated Attack Simulation in the Cloud, complete with detection use cases.☆556Updated 2 months ago
- Open Cloud Security Posture Management Engine☆337Updated 3 years ago
- Granular, Actionable Adversary Emulation for the Cloud☆1,919Updated this week
- Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground.☆493Updated last year
- Eliminate dangling elastic IPs by performing analysis on your resources within all your AWS accounts.☆268Updated 5 months ago
- Kubernetes focused container assessment and context discovery tool for penetration testing☆448Updated 8 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆1,453Updated 6 months ago
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆98Updated last year
- ☆112Updated last month
- ☆404Updated 2 years ago
- Graph-based security analysis for everyone☆342Updated last year
- Resource types that can be publicly exposed on AWS☆322Updated 2 years ago
- A tool for standing up (and tearing down!) purposefully insecure cloud infrastructure☆683Updated last year
- Multi-threaded AWS inventory collection tool with a focus on security-relevant resources and metadata.☆538Updated last month
- AWS CloudSaga - Simulate security events in AWS☆448Updated this week
- A collection of GCP IAM privilege escalation methods documented by the Rhino Security Labs team.☆367Updated 10 months ago
- ☆370Updated 11 months ago
- Security Remediation Guides☆718Updated 2 weeks ago
- An open project to list all publicly known cloud vulnerabilities and CSP security issues☆319Updated this week
- threatspec - continuous threat modeling, through code☆345Updated 4 years ago
- Evaluate source control (GitHub) security posture☆249Updated last year