padok-team / yatasLinks
A simple tool to audit your AWS/GCP infrastructure for misconfiguration or potential security issues with plugins integration
☆330Updated this week
Alternatives and similar repositories for yatas
Users that are interested in yatas are comparing it to the libraries listed below
Sorting:
- MetaHub is an automated contextual security findings enrichment and impact evaluation tool for vulnerability management.☆176Updated last week
- An AWS IAM policy statement parser and query tool.☆192Updated 2 months ago
- cloudgrep is grep for cloud storage☆326Updated 6 months ago
- find dangling domains in a multi cloud environment☆143Updated last week
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆109Updated 9 months ago
- OWASP Domain Protect - prevent subdomain takeover☆398Updated 8 months ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆143Updated 8 months ago
- Eliminate dangling elastic IPs by performing analysis on your resources within all your AWS accounts.☆278Updated 11 months ago
- A tool to uncover undocumented APIs from the AWS Console.☆113Updated 4 months ago
- Scan publicly accessible assets on your AWS cloud environment☆137Updated 2 months ago
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.☆287Updated 11 months ago
- ☆120Updated 3 months ago
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆114Updated last month
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆238Updated 9 months ago
- AWS Attack Path Management Tool - Walking on the Moon☆257Updated 8 months ago
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆222Updated 2 months ago
- This repo contains IOC, malware and malware analysis associated with Public cloud☆249Updated 9 months ago
- TODO: Funny pun about visibility☆227Updated last week
- Protect against subdomain takeover☆93Updated last month
- Lambda function that streamlines containment of an AWS account compromise☆345Updated last year
- ☆140Updated last week
- Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground.☆515Updated last year
- Public repository of all things cloud security.☆43Updated 11 months ago
- Released at Black Hat Asia on April 18, 2024, Cloud Console Cartographer is a framework for condensing groupings of cloud events (e.g. Cl…☆167Updated last year
- ☆189Updated 4 months ago
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆298Updated last month
- ☆179Updated 4 months ago
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalation☆108Updated last year
- Generate datasets of cloud audit logs for common attacks☆218Updated last year
- A collection of documented and undocumented AWS API models☆37Updated 9 months ago