KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.
☆106Dec 18, 2023Updated 2 years ago
Alternatives and similar repositories for KaiMonkey
Users that are interested in KaiMonkey are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Vulnerable Terraform Projects - Fork of https://github.com/bridgecrewio/terragoat☆17Apr 23, 2024Updated last year
- Detect compliance and security violations across Infrastructure as Code to mitigate risk before provisioning cloud native infrastructure.☆5,209Nov 20, 2025Updated 4 months ago
- ☆40Nov 29, 2024Updated last year
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆11Dec 20, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆200Aug 29, 2024Updated last year
- The SOCless automation framework☆141Feb 11, 2025Updated last year
- Offensive Terraform module which creates Kali Linux from the AWS marketplace and installs cloud security tools (Pacu, Cloudsplaining, Sco…☆19Sep 27, 2020Updated 5 years ago
- Terraform to run Scoutsuite security scan of projects within a Google Cloud Org. Report will be published to a GCS bucket.☆17Jan 5, 2026Updated 3 months ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆17Jun 11, 2024Updated last year
- A tool for standing up (and tearing down!) purposefully insecure cloud infrastructure☆765Oct 14, 2023Updated 2 years ago
- CloudSplaining on AWS Managed Policies☆44Sep 8, 2025Updated 7 months ago
- ☆14Jan 8, 2026Updated 3 months ago
- ☆11Jul 28, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Cloudsplaining is an AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized repo…☆2,202Updated this week
- Assisted Log Enabler for AWS - Find AWS resources that are not logging, and turn them on.☆272Updated this week
- ☆13May 16, 2019Updated 6 years ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Jan 18, 2022Updated 4 years ago
- A comprehensive scanner for Google Cloud☆357Dec 5, 2025Updated 4 months ago
- Compares and analyzes GCP IAM roles.☆79Mar 9, 2025Updated last year
- Cloud Commotion intends to cause chaos to simulate security incidents☆148Jun 18, 2024Updated last year
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆285Nov 27, 2025Updated 4 months ago
- This repository provides sample templates for security playbooks against various scenarios when using Amazon Web Services.☆653Updated this week
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆18Jul 30, 2024Updated last year
- Terraform module for Policy Sentry.☆26Nov 10, 2020Updated 5 years ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Jan 12, 2024Updated 2 years ago
- Unlocking Serverless Computing to Assess Security Controls☆262Mar 15, 2024Updated 2 years ago
- A cloud security tool to search and clean up unused AWS access keys, written in Go.☆52Sep 2, 2022Updated 3 years ago
- Automating Identity Access Management with Ansible☆15May 10, 2023Updated 2 years ago
- Automated Attack Simulation in the Cloud, complete with detection use cases.☆613Nov 28, 2024Updated last year
- Python library to carry out DFIR analysis on the Cloud☆502Apr 7, 2026Updated last week
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securit…☆37Oct 17, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆120Apr 9, 2026Updated last week
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆341Updated this week
- ☆170Sep 30, 2025Updated 6 months ago
- oauth security guidelines☆232Jun 25, 2019Updated 6 years ago
- Find security vulnerabilities, compliance issues, and infrastructure misconfigurations early in the development cycle of your infrastruct…☆2,609Updated this week
- 🚨ATTENTION🚨 The Security Stack Mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is k…☆387Apr 3, 2024Updated 2 years ago