threatstack / trashtaxiLinks
Keeping your infrastructure clean since 2018
☆12Updated last year
Alternatives and similar repositories for trashtaxi
Users that are interested in trashtaxi are comparing it to the libraries listed below
Sorting:
- AWS Metadata Proxy for protection against SSRF☆68Updated 5 years ago
- Osquery Mangement Server☆114Updated 4 years ago
- Marking instances dirty since 2018☆47Updated 6 years ago
- ☆83Updated 5 years ago
- Cloud multi-account metadata management tool.☆91Updated 4 years ago
- OpenControl-formatted industry standards and requirement documents☆46Updated last year
- Framework for reviewing and responding to events in AWS Flow Logs using Lambda Function☆46Updated last year
- Controls for Amazon Web Services☆26Updated 5 years ago
- Darkbit Cloud Security Tools☆25Updated 4 years ago
- An AWS cross-account tool to support human access with MFA for the CLI and GUI.☆19Updated 6 years ago
- Enhance the security of the EC2 metadata service. (Obsolete thanks to Instance Metadata Service Version 2, see note in README)☆31Updated 5 years ago
- Pragmatic Network Security for Cloud and Hybrid Networks☆11Updated 9 years ago
- A multi scanner for docker images. It drives Clair, Anchore, Trivy, Snyk, Grype, AWS ECR scans and consolidates the results.☆14Updated 2 years ago
- ⛔ DEPRECATED: A secure jenkins installation☆17Updated 5 years ago
- A Terraform Provider for Creating Data Flow Diagrams☆12Updated 6 years ago
- Tachikoma is a security alerting framework for human beings☆22Updated 6 years ago
- The original AWS security enforcer™☆61Updated 6 years ago
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆29Updated 5 years ago
- Public tables and other research that can accept PRs. Please visit the web link.☆44Updated 5 years ago
- Slides from presentations I give!☆25Updated 2 months ago
- Like the unix tree command but for GCP Org Heirarchy☆27Updated 4 years ago
- Cloud Auxiliary is a python wrapper and orchestration module for interacting with cloud providers☆78Updated 2 years ago
- 'Continuous' AWS perimeter monitoring: Periodically scan internet facing AWS resources to detect misconfigured services.☆64Updated 5 years ago
- Example Express application for collecting data from the Stethoscope app☆14Updated 7 years ago
- Ansible for installing Threatstack Agent☆24Updated last year
- Track public endpoints and connections across AWS accounts using VPC Flow Logs☆12Updated 9 years ago
- ☆11Updated 7 years ago
- Heimdall Lite 2.0 is a JavaScript based security results viewer and review tool supporting multiple security results formats, such as: In…☆21Updated 3 years ago
- InSpec profile to validate your VPC to the standards of the CIS Amazon Web Services Foundations Benchmark☆78Updated 6 months ago
- A starter-kit for a source-controlled, CLI-based osquery management workflow.☆30Updated 7 years ago