ramimac / breach-list-database
A meta-database collecting resources that compile lists of breaches
☆18Updated this week
Related projects ⓘ
Alternatives and complementary repositories for breach-list-database
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.☆16Updated 3 years ago
- Fun tools around the EBS Direct API☆18Updated 3 years ago
- Repository to archive GCP Documentation for local use☆13Updated last week
- A small library to alter AWS API requests; Used for fuzzing research☆21Updated last year
- A toolset to juggle AWS roles for persistent access☆51Updated 2 months ago
- Knowledge Report Alert & Normalization Generator☆27Updated 7 months ago
- Security Alert Decoration☆26Updated this week
- AWS Incident Response Kit (AIRK) - AWS Incident Response☆21Updated 4 years ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆40Updated last month
- ☆21Updated this week
- Common Golang Packages for use by the Various Cloud Nuke Tools☆28Updated this week
- ☆40Updated 4 months ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆57Updated last year
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆43Updated 5 months ago
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆12Updated 2 years ago
- https://breaches.cloud☆36Updated 3 weeks ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Updated 2 years ago
- ☆28Updated 3 months ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆21Updated 2 months ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆16Updated 4 months ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆26Updated 3 weeks ago
- ☆14Updated last year
- ☆18Updated this week
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆43Updated 10 months ago
- Offensive Terraform Website☆44Updated 4 years ago
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆29Updated 3 weeks ago
- ☆55Updated last year
- Given a list of domains and known IP and buckets that are owned, which might be susceptible to domain hijacking?☆13Updated last month
- ☆25Updated 3 years ago