tenable / cnappgoat-scenarios
This repository provides a comprehensive collection of Pulumi scenarios utilized by cnappgoat
☆18Updated last month
Related projects ⓘ
Alternatives and complementary repositories for cnappgoat-scenarios
- ☆36Updated 6 months ago
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆92Updated 11 months ago
- Holds the public Hacking the Cloud CTFs.☆49Updated 8 months ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆27Updated 2 years ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆26Updated 3 weeks ago
- ☆55Updated last year
- A public cloud security knowledgebase - https://www.secwiki.cloud/☆49Updated 8 months ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆58Updated last year
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by use…☆65Updated last year
- Virtual Security Operations Center☆49Updated last year
- ☆40Updated 5 months ago
- ☆58Updated last year
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆43Updated 6 months ago
- Tool for obfuscating and deobfuscating data.☆63Updated 7 months ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆82Updated 10 months ago
- This application was built to help reduce the amount of time it takes to review AWS Lambda code.☆60Updated this week
- 🖇️ STRIDE vs. ASVS equivalence table☆75Updated 2 months ago
- InfoSec OpenAI Examples☆19Updated 11 months ago
- ☆133Updated last year
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆57Updated last year
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆43Updated 10 months ago
- ☆25Updated 3 years ago
- AWS SSO serverless phishing API.☆29Updated 3 years ago
- Azure Activity Log Axe is a continually developing tool that simplifies the transactional log format provided by Microsoft. The tool leve…☆22Updated 2 months ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆30Updated 7 months ago
- Determine privileges from cloud credentials via brute-force testing.☆64Updated 2 months ago
- ☆66Updated 5 months ago
- This tool analyzes a given Gitlab repository and searches for dangling or force-pushed commits containing potential secret or interesting…☆39Updated 2 months ago
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆51Updated last year
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆36Updated last month