riskprofiler / CloudFrontierLinks
Monitor the internet attack surface of various public cloud environments. Currently supports AWS, GCP, Azure, DigitalOcean and Oracle Cloud.
โ124Updated last year
Alternatives and similar repositories for CloudFrontier
Users that are interested in CloudFrontier are comparing it to the libraries listed below
Sorting:
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.โ111Updated 4 years ago
- Find cloud assets that no one wants exposed ๐ โ๏ธโ345Updated 4 years ago
- 'Continuous' AWS perimeter monitoring: Periodically scan internet facing AWS resources to detect misconfigured services.โ64Updated 5 years ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.โ134Updated 5 years ago
- โ137Updated 2 years ago
- ๐๏ธ STRIDE vs. ASVS equivalence tableโ76Updated 9 months ago
- Hayat is a script for report and analyze Google Cloud Platform resources.โ80Updated 5 years ago
- A simple file-based scanner to look for potential AWS access and secret keys in filesโ92Updated last year
- GCP GOAT is the vulnerable application for learn the GCP Securityโ64Updated 2 weeks ago
- Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/)โ88Updated 2 years ago
- Cloud Security Dashboard for AWS - based on ScoutSuiteโ1Updated last year
- Lightspin AWS IAM Vulnerability Scannerโ96Updated 4 years ago
- sgCheckup generates nmap output based on scanning your AWS Security Groups for unexpected open ports.โ81Updated 3 years ago
- All-in-one tool for managing vulnerability reports from AppSec pipelinesโ106Updated 2 years ago
- Monitoring GitHub for sensitive data shared publiclyโ66Updated 3 years ago
- A Docker container for remote penetration testing.โ135Updated 4 years ago
- Cloud Security Operations Orchestratorโ185Updated last year
- FestIn - Open S3 Bucket Scannerโ234Updated 4 years ago
- Protect against subdomain takeoverโ92Updated last year
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raiderโ139Updated 3 years ago
- This is an offensive guide to securing AWS infrastructures. The hope is that by knowing how to take advantage of various types of AWS weaโฆโ172Updated 6 years ago
- A MITRE ATT&CK Navigator export for AWS GuardDuty Findingsโ137Updated 3 years ago
- SyntheticSun is a defense-in-depth security automation and monitoring framework which utilizes threat intelligence, machine learning, manโฆโ78Updated 3 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.โ76Updated 3 years ago
- Fetch the details of assets hosted on AWS.โ88Updated last year
- ๐งฎ An online calculator to assess the risk of web vulnerabilities based on OWASP Risk Assessmentโ158Updated 3 years ago
- Pentesting lab with a Kali Linux instance accessible via ssh & wireguard VPN and with vulnerable instances in a private subnetโ187Updated 11 months ago
- Tools for AWS forensicsโ63Updated 9 years ago
- Ugly Duckling is a lightweight scanner built specifically for our Crowdsource community to submit proof-of-concept modulesโ189Updated 3 years ago
- AWS S3 Bucket/Object Finderโ119Updated 3 years ago