KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.
☆107Dec 18, 2023Updated 2 years ago
Alternatives and similar repositories for KaiMonkey
Users that are interested in KaiMonkey are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Vulnerable Terraform Projects - Fork of https://github.com/bridgecrewio/terragoat☆17Apr 23, 2024Updated 2 years ago
- Detect compliance and security violations across Infrastructure as Code to mitigate risk before provisioning cloud native infrastructure.☆5,211Nov 20, 2025Updated 5 months ago
- SSL/TLS Certificate Checker - A Python script to validate SSL/TLS certificates for common misconfigurations and output the results in JSO…☆18Sep 27, 2023Updated 2 years ago
- ☆40Nov 29, 2024Updated last year
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆11Dec 20, 2021Updated 4 years ago
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆201Aug 29, 2024Updated last year
- The SOCless automation framework☆142Apr 15, 2026Updated 3 weeks ago
- Offensive Terraform module which creates Kali Linux from the AWS marketplace and installs cloud security tools (Pacu, Cloudsplaining, Sco…☆19Sep 27, 2020Updated 5 years ago
- Terraform to run Scoutsuite security scan of projects within a Google Cloud Org. Report will be published to a GCS bucket.☆17Jan 5, 2026Updated 4 months ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆17Jun 11, 2024Updated last year
- A tool for standing up (and tearing down!) purposefully insecure cloud infrastructure☆770Oct 14, 2023Updated 2 years ago
- CloudSplaining on AWS Managed Policies☆44Sep 8, 2025Updated 7 months ago
- ☆14Jan 8, 2026Updated 3 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Cloudsplaining is an AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized repo…☆2,205Updated this week
- Assisted Log Enabler for AWS - Find AWS resources that are not logging, and turn them on.☆274Updated this week
- ☆13May 16, 2019Updated 6 years ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Jan 18, 2022Updated 4 years ago
- A comprehensive scanner for Google Cloud☆357Dec 5, 2025Updated 5 months ago
- Compares and analyzes GCP IAM roles.☆79Mar 9, 2025Updated last year
- Cloud Commotion intends to cause chaos to simulate security incidents☆148Jun 18, 2024Updated last year
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆287Nov 27, 2025Updated 5 months ago
- This repository provides sample templates for security playbooks against various scenarios when using Amazon Web Services.☆655Updated this week
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆18Jul 30, 2024Updated last year
- Terraform module for Policy Sentry.☆26Nov 10, 2020Updated 5 years ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Jan 12, 2024Updated 2 years ago
- Unlocking Serverless Computing to Assess Security Controls☆262Mar 15, 2024Updated 2 years ago
- Scans your Github Actions for security issues☆96Updated this week
- A cloud security tool to search and clean up unused AWS access keys, written in Go.☆52Sep 2, 2022Updated 3 years ago
- Automating Identity Access Management with Ansible☆15May 10, 2023Updated 2 years ago
- Automated Attack Simulation in the Cloud, complete with detection use cases.☆613Nov 28, 2024Updated last year
- Python library to carry out DFIR analysis on the Cloud☆503Apr 17, 2026Updated 2 weeks ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securit…☆37Oct 17, 2024Updated last year
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Apr 27, 2026Updated last week
- The dataset was used as a support to attack obfuscations. It is the largest obfuscated dataset, with realistic and various binaries and f…☆19Jan 15, 2026Updated 3 months ago
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆121Apr 17, 2026Updated 2 weeks ago
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆341Apr 26, 2026Updated last week
- ☆170Sep 30, 2025Updated 7 months ago
- oauth security guidelines☆232Jun 25, 2019Updated 6 years ago