A comprehensive framework for analyzing and defending against attacks targeting Software Development Life Cycle Infrastructure.
☆133Mar 4, 2026Updated 2 weeks ago
Alternatives and similar repositories for SITF
Users that are interested in SITF are comparing it to the libraries listed below
Sorting:
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- ☆36Apr 29, 2025Updated 10 months ago
- Security Orchestration, Automation and Response for Security Analysts, published by Packt☆23Jan 24, 2025Updated last year
- ☆35Jan 27, 2023Updated 3 years ago
- 微信公众号安全漏洞文章链接聚合☆28Updated this week
- Give kudos and share some kind words with anyone in your workspace☆16Feb 26, 2026Updated 3 weeks ago
- Simple LLM service identification - translate IP:Port to Ollama, vLLM, LiteLLM, or 30+ other AI services in seconds☆39Mar 14, 2026Updated last week
- MCP Server Security Standard (MSSS): an open, testable security control standard for certifying MCP servers, with levels, evidence requir…☆69Mar 12, 2026Updated last week
- SCP management tool☆135Oct 23, 2023Updated 2 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- Convert cloudtrail data to MITRE ATT&CK Sightings☆82Jul 25, 2022Updated 3 years ago
- A catalog of services that can be publicly exposed within different cloud providers.☆14Aug 30, 2024Updated last year
- This project provide some Terraform modules to deploy Azure Firewall in an hub and spoke infrastructure.☆13Aug 1, 2021Updated 4 years ago
- Repository containing a set of policies for aws resources created with terraform☆12Sep 16, 2019Updated 6 years ago
- Falco plugins registry☆114Updated this week
- Complete source code for tutorial on how to deploy Django to Kubernetes on AWS (EKS, RDS, EFS)☆14Nov 22, 2024Updated last year
- Troubleshooting MDE Workstations☆42Jan 7, 2026Updated 2 months ago
- Offensive Terraform module which copies publicly exposed EBS snapshot to us-east-1 region in attacker's AWS account and creates EBS volum…☆14Sep 18, 2020Updated 5 years ago
- ☆229Mar 10, 2026Updated last week
- Testing for the Cloud☆19Jan 12, 2020Updated 6 years ago
- A collection of documented and undocumented AWS API models☆53Nov 21, 2025Updated 4 months ago
- Tool for obfuscating and deobfuscating data.☆77Mar 20, 2024Updated 2 years ago
- A command-line tool for streamlining end-to-end compliance workflows on local systems.☆31Mar 12, 2026Updated last week
- ☆54Updated this week
- Cybersecurity Architects Handbook, published by Packt☆27Mar 27, 2024Updated last year
- Powershell Based tool for gathering information related to O365 intrusions and potential Breaches☆17Dec 29, 2024Updated last year
- CloudSplaining on AWS Managed Policies☆44Sep 8, 2025Updated 6 months ago
- DEF CON 31 AI Village - LLMs: Loose Lips Multipliers☆10Aug 16, 2023Updated 2 years ago
- Open source templates you can use to bootstrap your security programs☆893Dec 28, 2025Updated 2 months ago
- Easily create index of your SANS books☆18Oct 28, 2022Updated 3 years ago
- An industrial strength, best practice reference architecture showing how to prevent credential sprawl with Vault on AWS☆18Jun 18, 2017Updated 8 years ago
- ☆16Mar 2, 2025Updated last year
- ☆16May 28, 2025Updated 9 months ago
- 利用Gemini分析前端js文件中的安全漏洞☆39Jun 30, 2025Updated 8 months ago
- Generates runbooks for GuardDuty findings☆38Jun 24, 2024Updated last year
- AWS CloudFormation template to set up AWS Config to record only what’s needed for Security Hub.☆13Jul 12, 2023Updated 2 years ago
- Ansible role that installs the AWS CloudWatch Log Agent☆16Aug 23, 2020Updated 5 years ago
- Supply-Chain Firewall (SCFW) is a tool for preventing the installation of malicious npm and PyPI packages☆218Mar 13, 2026Updated last week