rmkanda / tools
Curated list of security tools
☆64Updated last year
Alternatives and similar repositories for tools:
Users that are interested in tools are comparing it to the libraries listed below
- A deliberately vulnerable Kubernetes cluster☆121Updated last year
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆30Updated 4 months ago
- Awesome resources about Security in Kubernetes☆41Updated 2 years ago
- Holds the public Hacking the Cloud CTFs.☆54Updated 11 months ago
- OWASP Kubernetes Security Testing Guide☆37Updated 5 months ago
- OWASP Foundation Web Respository☆43Updated 5 months ago
- Convert cloudtrail data to MITRE ATT&CK Sightings☆79Updated 2 years ago
- Clean accounts over permissions in GCP infra at scale☆71Updated last year
- https://breaches.cloud☆38Updated 4 months ago
- Damn Vulnerable Kubernetes App (DVKA) is a series of apps deployed on Kubernetes that are damn vulnerable.☆118Updated this week
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆38Updated 5 months ago
- CloudSplaining on AWS Managed Policies☆41Updated this week
- Protect against subdomain takeover☆92Updated 8 months ago
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆82Updated last week
- a tool to audit the istio service mesh☆174Updated 3 years ago
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by use…☆67Updated 2 years ago
- A collection of DevSecOps reference architectures☆66Updated 4 years ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆137Updated last month
- Lightspin AWS IAM Vulnerability Scanner☆96Updated 3 years ago
- A docker container to simplify and secure the use of Infrastructure as Code (IaC)☆70Updated this week
- Compares and analyzes GCP IAM roles.☆77Updated 8 months ago
- Threat Modeling Manifesto☆27Updated 7 months ago
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆62Updated 8 months ago
- A collection of 2020 artifacts describing the major pain points, vulnerabilities and concerns with Cloud Security.☆19Updated 4 years ago
- Public repository of all things cloud security.☆40Updated 5 months ago
- Monitor the internet attack surface of various public cloud environments. Currently supports AWS, GCP, Azure, DigitalOcean and Oracle Clo…☆122Updated 10 months ago
- Curating Falco rules with MITRE ATT&CK Matrix☆77Updated 11 months ago
- A curated list of Software Component Analysis (SCA) books, courses - free and paid, videos, tools, and tutorials.☆99Updated 2 months ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆79Updated last month
- HashiCorp-relevant rules for the Semgrep code analysis tool☆39Updated last year