straithe / ReadingAndResourceLists
Reading and resources lists on a variety of technical topics.
☆43Updated 4 years ago
Alternatives and similar repositories for ReadingAndResourceLists:
Users that are interested in ReadingAndResourceLists are comparing it to the libraries listed below
- This repo contains a list of aws security related talks.☆12Updated 7 years ago
- A collection of DoD and Federal Government Cloud Computing Resources☆48Updated 3 years ago
- Security Scanner based on CIS benchmark 1.1 inspired by Scout2☆53Updated 2 years ago
- AWS Certified Security Specialty (2020) course notes☆117Updated 4 years ago
- Rapidly apply hundreds of security controls in Azure☆184Updated last year
- A collection of 2020 artifacts describing the major pain points, vulnerabilities and concerns with Cloud Security.☆19Updated 4 years ago
- AWS Security Cookbook, published by Packt☆43Updated 2 years ago
- This script is used to generate some basic detections of the aws security services☆72Updated 2 years ago
- Hands-on workshop on how to build security automation in pipelines☆37Updated 9 months ago
- The SOCless automation framework☆137Updated this week
- ☆14Updated last year
- Sample DevSecOps pipelines (heavily biased on the "Sec") for various stacks and tools using open-source security tools and AWS native ser…☆67Updated 3 years ago
- A continuous security pipeline demo for the AWS DevSecOps Workshop.☆45Updated 5 years ago
- Darkbit Cloud Security Tools☆25Updated 4 years ago
- Tool for signing and verifying the integrity of CloudFormation templates☆15Updated 2 years ago
- Centralizing AWS CloudWatch log forwarding via EventBridge and Step Functions☆49Updated 2 years ago
- List of vendors that do not allow IMDSv2 enforcement☆142Updated 9 months ago
- Public tables and other research that can accept PRs. Please visit the web link.☆44Updated 5 years ago
- A tool for quickly evaluating IAM permissions in AWS.☆72Updated 8 months ago
- Create custom AMIs with Packer and Ansible to enable rapid provisioning of offensive infrastructure in AWS using Terraform.☆21Updated 2 years ago
- SkyWrapper helps to discover suspicious creation forms and uses of temporary tokens in AWS☆105Updated 3 years ago
- S3 runbook☆30Updated 7 years ago
- Learning Terraform in 20 Hours☆28Updated 4 years ago
- ThreatModel for Amazon S3 - Library of all the attack scenarios on Amazon S3, and how to mitigate them following a risk-based approach☆150Updated last year
- Holds the public Hacking the Cloud CTFs.☆54Updated 11 months ago
- CDK app to setup an isolated AWS network to experiment with ways of exfiltrating data☆18Updated 3 years ago
- Hands-On AWS Penetration Testing with Kali Linux published by Packt☆130Updated 2 years ago
- Offensive Terraform Website☆44Updated 4 years ago
- A production-friendly malware scanner for your AWS cloud☆199Updated 3 years ago
- Taking the AWS Solutions Architect certification path is a great way to test your knowledge and skills in cloud computing/cloud engineeri…☆35Updated 5 years ago