padok-team / yatas
A simple tool to audit your AWS/GCP infrastructure for misconfiguration or potential security issues with plugins integration
☆313Updated this week
Related projects ⓘ
Alternatives and complementary repositories for yatas
- An AWS IAM policy statement parser and query tool.☆157Updated 9 months ago
- find dangling domains in a multi cloud environment☆135Updated 6 months ago
- MetaHub is an automated contextual security findings enrichment and impact evaluation tool for vulnerability management.☆156Updated this week
- ☆147Updated last month
- cloudgrep is grep for cloud storage☆318Updated this week
- A tool to uncover undocumented APIs from the AWS Console.☆83Updated 2 months ago
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.☆266Updated 2 months ago
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆203Updated last week
- A tool for AWS incident response, that allows for enumeration, acquisition and analysis of data from AWS environments for the purpose of …☆177Updated last month
- Protect against subdomain takeover☆92Updated 5 months ago
- OWASP Domain Protect - prevent subdomain takeover☆397Updated last month
- ☆109Updated this week
- Eliminate dangling elastic IPs by performing analysis on your resources within all your AWS accounts.☆265Updated 2 months ago
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆96Updated last month
- List of known AWS accounts☆167Updated last month
- This repo contains IOC, malware and malware analysis associated with Public cloud☆244Updated last week
- Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground.☆480Updated 9 months ago
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalation☆100Updated 9 months ago
- AWS Attack Path Management Tool - Walking on the Moon☆223Updated 3 weeks ago
- ☆152Updated 2 months ago
- Create your own vulnerable by design AWS penetration testing playground☆331Updated 5 months ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆87Updated last week
- Generate datasets of cloud audit logs for common attacks☆184Updated 3 months ago
- AWS honey token manager☆84Updated 3 months ago
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆253Updated last week
- Cloud Commotion intends to cause chaos to simulate security incidents☆140Updated 5 months ago
- Crowdsourced list of sensitive IAM Actions☆139Updated 3 weeks ago
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆175Updated 2 months ago
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆96Updated 11 months ago
- Lambda function that streamlines containment of an AWS account compromise☆315Updated 11 months ago