A comprehensive framework for analyzing and defending against attacks targeting Software Development Life Cycle Infrastructure.
☆124Updated this week
Alternatives and similar repositories for SITF
Users that are interested in SITF are comparing it to the libraries listed below
Sorting:
- ☆36Apr 29, 2025Updated 10 months ago
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- Repository to archive AWS Documentation for local use☆50Oct 14, 2024Updated last year
- ☆14Jan 8, 2026Updated last month
- SCP management tool☆135Oct 23, 2023Updated 2 years ago
- This project provide some Terraform modules to deploy Azure Firewall in an hub and spoke infrastructure.☆13Aug 1, 2021Updated 4 years ago
- Offensive Terraform module which copies publicly exposed EBS snapshot to us-east-1 region in attacker's AWS account and creates EBS volum…☆14Sep 18, 2020Updated 5 years ago
- Repository containing a set of policies for aws resources created with terraform☆12Sep 16, 2019Updated 6 years ago
- ☆35Jan 27, 2023Updated 3 years ago
- Powershell Based tool for gathering information related to O365 intrusions and potential Breaches☆17Dec 29, 2024Updated last year
- A command-line tool for streamlining end-to-end compliance workflows on local systems.☆30Updated this week
- A catalog of services that can be publicly exposed within different cloud providers.☆14Aug 30, 2024Updated last year
- Testing for the Cloud☆19Jan 12, 2020Updated 6 years ago
- Troubleshooting MDE Workstations☆42Jan 7, 2026Updated last month
- An industrial strength, best practice reference architecture showing how to prevent credential sprawl with Vault on AWS☆18Jun 18, 2017Updated 8 years ago
- Community generated list of API security tests to find OWASP top10, HackerOne top 10 vulnerabilities☆41Feb 16, 2026Updated last week
- A meta-database collecting resources that compile lists of breaches☆21Oct 30, 2025Updated 3 months ago
- Ansible role that installs the AWS CloudWatch Log Agent☆16Aug 23, 2020Updated 5 years ago
- Example AWS Resource control policies to get started or mature your usage of AWS RCPs.☆198Feb 2, 2026Updated 3 weeks ago
- A simple example of Pipeline-as-code with Jenkins and Terraform☆15Mar 31, 2017Updated 8 years ago
- Retrieves information about a given domain from the Google Transparency Report : https://transparencyreport.google.com/https/certificates☆20Dec 15, 2021Updated 4 years ago
- Summaries, transcripts, key points, and other useful insights from fwd:cloudsec 2025 talks for those of us who don't have time to watch e…☆85Jul 4, 2025Updated 7 months ago
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behavior☆32Feb 16, 2026Updated last week
- ☆23May 22, 2023Updated 2 years ago
- Open source templates you can use to bootstrap your security programs☆890Dec 28, 2025Updated 2 months ago
- Offensive Kubernetes Threat Matrix -- kubenomicon.com☆55Aug 12, 2025Updated 6 months ago
- A collection of documented and undocumented AWS API models☆53Nov 21, 2025Updated 3 months ago
- Cloud Commotion intends to cause chaos to simulate security incidents☆145Jun 18, 2024Updated last year
- Harden-Runner is a CI/CD security agent that works like an EDR for GitHub Actions runners. It monitors network egress, file integrity, an…☆966Updated this week
- Repro for Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!☆21Aug 25, 2024Updated last year
- Cybersecurity Architects Handbook, published by Packt☆27Mar 27, 2024Updated last year
- Collection of my slide decks, conference videos and research white papers☆27Sep 23, 2025Updated 5 months ago
- A demonstration of a continuous integration pipeline focused on security testing☆31Oct 5, 2018Updated 7 years ago
- ☆43Aug 27, 2025Updated 6 months ago
- Microsoft Vulnerable Driver Block Lists in CSV and JSON for SIEM lookups☆53Sep 19, 2025Updated 5 months ago
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.☆31Jul 12, 2023Updated 2 years ago
- Red Team AI prompts☆49Dec 2, 2025Updated 2 months ago
- Docker details and examples for the Lynis project☆28Oct 16, 2016Updated 9 years ago