straithe / ReadingAndResourceListsLinks
Reading and resources lists on a variety of technical topics.
☆43Updated 4 years ago
Alternatives and similar repositories for ReadingAndResourceLists
Users that are interested in ReadingAndResourceLists are comparing it to the libraries listed below
Sorting:
- This repo contains a list of aws security related talks.☆12Updated 7 years ago
- ☆14Updated 2 years ago
- Hands-on workshop on how to build security automation in pipelines☆37Updated last year
- This package provides an easy way to create a refreshable boto3 Session with AWS Roles Anywhere.☆57Updated last month
- ☆64Updated 3 weeks ago
- Security Scanner based on CIS benchmark 1.1 inspired by Scout2☆53Updated 2 years ago
- A collection of DoD and Federal Government Cloud Computing Resources☆48Updated 4 years ago
- The open source version of the AWS Security Hub documentation. To provide feedback or request changes, you can submit a pull request that…☆35Updated 2 years ago
- SkyWrapper helps to discover suspicious creation forms and uses of temporary tokens in AWS☆108Updated 4 years ago
- This command line tool counts the number of resources in different categories across Amazon regions.☆59Updated 5 years ago
- The SOCless automation framework☆140Updated 4 months ago
- ☆19Updated 3 years ago
- Public tables and other research that can accept PRs. Please visit the web link.☆44Updated 5 years ago
- Utility for collecting resource-based policies from AWS☆23Updated 2 years ago
- A MITRE ATT&CK Navigator export for AWS GuardDuty Findings☆137Updated 3 years ago
- This is a collection of AWS CloudFormation templates which create Lambda functions triggered by CloudWatch Events rule to evaluate AWS AP…☆52Updated 6 years ago
- A collection of 2020 artifacts describing the major pain points, vulnerabilities and concerns with Cloud Security.☆19Updated 4 years ago
- Framework for reviewing and responding to events in AWS Flow Logs using Lambda Function☆46Updated last year
- Darkbit Cloud Security Tools☆25Updated 4 years ago
- Rapidly apply hundreds of security controls in Azure☆184Updated last month
- CDK app to setup an isolated AWS network to experiment with ways of exfiltrating data☆18Updated 3 years ago
- Allowing to display your AWS Cloudwatch dashboards on your website or locally☆17Updated 2 years ago
- ThreatModel for Amazon S3 - Library of all the attack scenarios on Amazon S3, and how to mitigate them following a risk-based approach☆153Updated last year
- Lambda Extension for iamlive☆42Updated 4 years ago
- GCP Auto Remediation Suite for High Risk Events☆43Updated 4 years ago
- Tool for signing and verifying the integrity of CloudFormation templates☆15Updated 2 years ago
- A schema and set of tools for using SQL to query cloud infrastructure.☆66Updated 3 years ago
- A curated collection of tools and resources for building security with a developer first approach.☆28Updated 2 years ago
- Solution to setup a recurring Security Hub CSV full report with email notification to provide detailed report of the security posture.☆21Updated 2 months ago
- Mindmaps about AWS based on public information☆134Updated 3 years ago