riskprofiler / CloudFrontierLinks
Monitor the internet attack surface of various public cloud environments. Currently supports AWS, GCP, Azure, DigitalOcean and Oracle Cloud.
โ126Updated last year
Alternatives and similar repositories for CloudFrontier
Users that are interested in CloudFrontier are comparing it to the libraries listed below
Sorting:
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.โ110Updated 4 years ago
- Find cloud assets that no one wants exposed ๐ โ๏ธโ348Updated 5 years ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.โ135Updated 5 years ago
- ๐งฎ An online calculator to assess the risk of web vulnerabilities based on OWASP Risk Assessmentโ161Updated 4 years ago
- All-in-one tool for managing vulnerability reports from AppSec pipelinesโ108Updated 2 years ago
- sgCheckup generates nmap output based on scanning your AWS Security Groups for unexpected open ports.โ82Updated 4 years ago
- 'Continuous' AWS perimeter monitoring: Periodically scan internet facing AWS resources to detect misconfigured services.โ64Updated 6 years ago
- A Docker container for remote penetration testing.โ138Updated 4 years ago
- Cloud Security Operations Orchestratorโ187Updated last year
- Lightspin AWS IAM Vulnerability Scannerโ96Updated 4 years ago
- Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/)โ89Updated 2 years ago
- ๐๏ธ STRIDE vs. ASVS equivalence tableโ76Updated last year
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat โฆโ191Updated last year
- Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).โ143Updated 4 months ago
- Monitoring GitHub for sensitive data shared publiclyโ66Updated 3 years ago
- โ139Updated 2 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.โ78Updated 3 years ago
- SyntheticSun is a defense-in-depth security automation and monitoring framework which utilizes threat intelligence, machine learning, manโฆโ78Updated 4 years ago
- FestIn - Open S3 Bucket Scannerโ233Updated 4 years ago
- This is an offensive guide to securing AWS infrastructures. The hope is that by knowing how to take advantage of various types of AWS weaโฆโ172Updated 6 years ago
- Red Team Scripts for AWS.โ170Updated 5 years ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raiderโ139Updated 4 years ago
- Route53/CloudFront Vulnerability Assessment Utilityโ86Updated 2 years ago
- Search exposed EBS volumes for secretsโ299Updated 2 years ago
- A command line security audit tool for Amazon Web Servicesโ82Updated 6 years ago
- GCP GOAT is the vulnerable application for learn the GCP Securityโ67Updated 3 months ago
- Presentations, training modules, and other education materials from Duo Security's Application Security team.โ77Updated 4 years ago
- Holds the public Hacking the Cloud CTFs.โ59Updated last year
- AWS Certified Security Specialty (2020) course notesโ122Updated 4 years ago
- Protect against subdomain takeoverโ93Updated last month