CloudSplaining on AWS Managed Policies
☆44Sep 8, 2025Updated 5 months ago
Alternatives and similar repositories for camp
Users that are interested in camp are comparing it to the libraries listed below
Sorting:
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- Deliberately vulnerable AWS resources for security assessment demos☆32Aug 20, 2022Updated 3 years ago
- Automatically compile an AWS Service Control Policy that ONLY allows AWS services that are compliant with your preferred compliance frame…☆224Aug 11, 2023Updated 2 years ago
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- PolicyGlass allows you to analyse one or more AWS policies' effective permissions in aggregate, by restating them in the form of PolicySh…☆60Jan 9, 2022Updated 4 years ago
- Demonstration that AWS IAM policy evaluation docs are incorrect☆16Sep 28, 2021Updated 4 years ago
- Compares and analyzes GCP IAM roles.☆78Mar 9, 2025Updated 11 months ago
- Validate all your Customer IAM Policies against AWS Access Analyzer - Policy Validation☆43May 20, 2021Updated 4 years ago
- AWS Trail Recon is an idea that came up during gohacking's offensive AWS security training. The idea is to use cloudtrail:lookupevents to…☆15May 14, 2024Updated last year
- A small library to alter AWS API requests; Used for fuzzing research☆22Nov 2, 2023Updated 2 years ago
- A meta-database collecting resources that compile lists of breaches☆21Oct 30, 2025Updated 4 months ago
- Modular Kubernetes lab which provides an easy and streamlined way to deploy a test cluster with support for different components.☆53Oct 2, 2025Updated 5 months ago
- ☆25Jun 27, 2024Updated last year
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆283Nov 27, 2025Updated 3 months ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆59Sep 20, 2023Updated 2 years ago
- Monitor AWS Managed IAM Policies Changes☆493Updated this week
- ☆284Dec 1, 2022Updated 3 years ago
- Demos for several kubernetes security features☆64Jan 9, 2025Updated last year
- This repository shows how to setup Centralized CloudWatch Observability Manager using Terraform☆17Nov 28, 2024Updated last year
- Configure and deploy AWS GuardDuty.☆11Sep 9, 2025Updated 5 months ago
- ☆14Jul 8, 2025Updated 7 months ago
- Centralizing AWS CloudWatch log forwarding via EventBridge and Step Functions☆48Feb 12, 2023Updated 3 years ago
- Useful scripts, Docker images, docker-compose apps, and Terraform modules.☆149Feb 15, 2026Updated 2 weeks ago
- A tool to check the security settings of Github Organizations.☆75Feb 9, 2026Updated 2 weeks ago
- ☆60May 25, 2023Updated 2 years ago
- Resource types that can be publicly exposed on AWS☆331Feb 23, 2022Updated 4 years ago
- A walkthrough of security controls for a serverless architecture via a demo application☆11May 11, 2022Updated 3 years ago
- ☆10Jul 24, 2017Updated 8 years ago
- The set of standards that Geomys maintainers strive to uphold in our professional activity as open source maintainers☆38Oct 23, 2025Updated 4 months ago
- This web based application enables developers to quickly unit test individual API calls for both Incapsula and SecureSphere, as well as p…☆19Sep 12, 2023Updated 2 years ago
- Scripts and Lambdas to help with automated deployment of AWS Shield Advanced☆12Feb 11, 2022Updated 4 years ago
- ☆11Mar 9, 2023Updated 2 years ago
- 🖇️ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.☆76Aug 22, 2024Updated last year
- AWS docs, guides, and other tools☆75Feb 4, 2023Updated 3 years ago
- ☆83Dec 5, 2019Updated 6 years ago
- ☆157Jul 8, 2023Updated 2 years ago
- ☆124May 26, 2025Updated 9 months ago
- ☆229Updated this week
- SCP management tool☆135Oct 23, 2023Updated 2 years ago