webpwnized / gcp-auditLinks
GCP Audit checks projects in Google Cloud for compliance with CIS Benchmarks
☆29Updated 7 months ago
Alternatives and similar repositories for gcp-audit
Users that are interested in gcp-audit are comparing it to the libraries listed below
Sorting:
- Virtual Security Operations Center☆52Updated 2 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- ☆60Updated 2 years ago
- A not-curated list of cloud hacking labs☆26Updated last year
- Determine privileges from cloud credentials via brute-force testing.☆67Updated last year
- ☆19Updated last year
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆24Updated 4 years ago
- ☆18Updated this week
- ☆24Updated 2 years ago
- Dependency Combobulator☆95Updated 2 years ago
- A multi-cloud DNS record scanner that aims to help cybersecurity/IT analysts identify dangling CNAME records in their cloud DNS services …☆50Updated 2 years ago
- ☆19Updated 3 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆58Updated 2 years ago
- Tool to automate corporate network segmentation test☆21Updated 5 years ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆16Updated last year
- GCP GOAT is the vulnerable application for learn the GCP Security☆70Updated 7 months ago
- ReconPal: Leveraging NLP for Infosec☆57Updated 3 years ago
- OWASP Foundation Web Respository☆36Updated 4 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 3 years ago
- InfoSec OpenAI Examples☆19Updated 2 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 5 years ago
- CIS Benchmark testing of Windows SIEM configuration☆45Updated 2 years ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆17Updated 3 years ago
- ☆50Updated last year
- This tool gives developers, researchers and companies the ability to analyze software packages of different programming languages that ar…☆69Updated 4 years ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆24Updated 2 years ago
- S3 bucket enumerator☆30Updated 6 years ago
- ☆42Updated 9 months ago
- ☆36Updated 3 years ago
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆31Updated last month