technologik / terraform_attack_automation
Automation associated with our talk: Attacking and Defending Infrastructure with Terraform
☆16Updated 2 years ago
Alternatives and similar repositories for terraform_attack_automation:
Users that are interested in terraform_attack_automation are comparing it to the libraries listed below
- Compares and analyzes GCP IAM roles.☆77Updated 2 weeks ago
- GCP CSPM using Google Sheets☆35Updated 9 months ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61Updated last year
- 🖇️ STRIDE vs. ASVS equivalence table☆76Updated 7 months ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Updated 3 years ago
- Repository to archive GCP Documentation for local use☆15Updated last month
- Updated incident response generator for training classes☆43Updated 3 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆76Updated 3 years ago
- Harness the security superpowers of your cloud asset inventory☆11Updated 6 months ago
- Manage GuardDuty At Enterprise Scale☆22Updated 4 years ago
- Research on the enumeration of IAM permissions without logging to CloudTrail☆60Updated 3 years ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆58Updated last year
- Convert cloudtrail data to MITRE ATT&CK Sightings☆79Updated 2 years ago
- Utility for downloading and mounting EBS snapshots using the EBS Direct API's☆82Updated last week
- Assess certain AWS network configurations☆11Updated 6 years ago
- ☆82Updated 5 years ago
- ☆63Updated 2 years ago
- Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).☆142Updated last year
- CloudSplaining on AWS Managed Policies☆41Updated this week
- Scans Slack for API tokens, credentials, passwords, and more using YARA rules☆39Updated 4 years ago
- Audit log wall of shame.☆41Updated 5 months ago
- Generates runbooks for GuardDuty findings☆35Updated 9 months ago
- Cloud Security Dashboard for AWS - based on ScoutSuite☆1Updated last year
- Detect publicly accessible Lambda Function URLs in your AWS account☆9Updated 2 years ago
- HashiCorp-relevant rules for the Semgrep code analysis tool☆39Updated last year
- ☆38Updated 4 months ago
- Slack bot which promotes Defense in Depth/Zero Trust security practices☆24Updated 2 years ago
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆30Updated 5 months ago
- Hide from the InstanceCredentialExfiltration GuardDuty finding by using VPC Endpoints☆113Updated last year
- Clean accounts over permissions in GCP infra at scale☆71Updated last year