padok-team / yatas
A simple tool to audit your AWS/GCP infrastructure for misconfiguration or potential security issues with plugins integration
☆313Updated this week
Related projects ⓘ
Alternatives and complementary repositories for yatas
- An AWS IAM policy statement parser and query tool.☆156Updated 8 months ago
- MetaHub is an automated contextual security findings enrichment and impact evaluation tool for vulnerability management.☆155Updated last week
- find dangling domains in a multi cloud environment☆135Updated 6 months ago
- Eliminate dangling elastic IPs by performing analysis on your resources within all your AWS accounts.☆265Updated last month
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.☆266Updated 2 months ago
- Create your own vulnerable by design AWS penetration testing playground☆329Updated 5 months ago
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalation☆100Updated 8 months ago
- cloudgrep is grep for cloud storage☆319Updated 3 months ago
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆202Updated 4 months ago
- ☆109Updated 3 weeks ago
- A tool to uncover undocumented APIs from the AWS Console.☆80Updated last month
- OWASP Domain Protect - prevent subdomain takeover☆397Updated last month
- Protect against subdomain takeover☆92Updated 5 months ago
- ☆137Updated last week
- Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground.☆478Updated 9 months ago
- This repo contains IOC, malware and malware analysis associated with Public cloud☆244Updated this week
- Lambda function that streamlines containment of an AWS account compromise☆315Updated 11 months ago
- Scan publicly accessible assets on your AWS cloud environment☆139Updated 4 months ago
- Cloud Commotion intends to cause chaos to simulate security incidents☆137Updated 4 months ago
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆251Updated 3 weeks ago
- ☆147Updated 3 weeks ago
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆96Updated last month
- A collection of documented and undocumented AWS API models☆27Updated 2 months ago
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆175Updated 2 months ago
- Generate datasets of cloud audit logs for common attacks☆182Updated 3 months ago
- Crowdsourced list of sensitive IAM Actions☆139Updated 2 weeks ago
- A tool for AWS incident response, that allows for enumeration, acquisition and analysis of data from AWS environments for the purpose of …☆175Updated last month
- ☆166Updated last month
- S3 Account Search☆245Updated 3 weeks ago
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆196Updated last month