The SOCless automation framework
☆141Feb 11, 2025Updated last year
Alternatives and similar repositories for socless
Users that are interested in socless are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆18Jul 30, 2024Updated last year
- ☆11Dec 9, 2025Updated 4 months ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Jan 18, 2022Updated 4 years ago
- ☆376Feb 23, 2024Updated 2 years ago
- Convert cloudtrail data to MITRE ATT&CK Sightings☆82Jul 25, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Safer AWS SCP deployments via real-time monitoring☆56Sep 30, 2023Updated 2 years ago
- Varna: Quick & Cheap AWS CloudTrail Monitoring with Event Query Language (EQL)☆52Dec 26, 2022Updated 3 years ago
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆29Aug 18, 2019Updated 6 years ago
- Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.☆649Nov 21, 2019Updated 6 years ago
- ☆83Dec 5, 2019Updated 6 years ago
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- AWS IAM linting library☆1,113Jan 7, 2026Updated 3 months ago
- A tool for standing up (and tearing down!) purposefully insecure cloud infrastructure☆765Oct 14, 2023Updated 2 years ago
- A simple way of detecting multithreaded exfiltration in Zeek.☆15May 1, 2025Updated 11 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Security Alert Decoration☆27Jul 21, 2025Updated 8 months ago
- Research on the enumeration of IAM permissions without logging to CloudTrail☆60Jun 11, 2021Updated 4 years ago
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆106Dec 18, 2023Updated 2 years ago
- SCP management tool☆136Oct 23, 2023Updated 2 years ago
- AWS honey token manager☆90Aug 1, 2024Updated last year
- Collection of Slides From My Conference Talks☆20Nov 21, 2022Updated 3 years ago
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- Audit your GitHub Actions workflow runs to see exactly which Actions were downloaded☆88Updated this week
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆54Apr 25, 2023Updated 2 years ago
- Python installable command line utiltity for mitigation of host and key compromises.☆346Jul 23, 2021Updated 4 years ago
- Tool to automate takeover of DigitalOcean Kubernetes cluster. Check out the blog post for more info.☆16Dec 20, 2018Updated 7 years ago
- A tool for quickly evaluating IAM permissions in AWS.☆1,548Aug 2, 2024Updated last year
- Granular, Actionable Adversary Emulation for the Cloud☆2,292Apr 9, 2026Updated last week
- ☆56Dec 13, 2025Updated 4 months ago
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆100Updated this week
- Unit testing framework for test driven security of AWS, GCP, Heroku and more.☆108Jan 22, 2026Updated 2 months ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆59Sep 7, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A public collection of detections designed to detect threats associated with the Okta WIC Platform.☆23Mar 26, 2026Updated 3 weeks ago
- Open source security data lake for threat hunting, detection & response, and cybersecurity analytics at petabyte scale on AWS☆1,668Jan 8, 2025Updated last year
- Cartography is a Python tool that pulls infrastructure assets and their relationships into a Neo4j graph database.☆3,822Updated this week
- Knowledge Report Alert & Normalization Generator☆26Feb 11, 2026Updated 2 months ago
- ☆69Jul 18, 2025Updated 8 months ago
- A toolset to juggle AWS roles for persistent access☆62Aug 14, 2024Updated last year
- Listing of resources for example AWS Service Control Policies (SCPs)☆16Jan 10, 2024Updated 2 years ago