☆14Jun 20, 2022Updated 3 years ago
Alternatives and similar repositories for awesome-gcpsec
Users that are interested in awesome-gcpsec are comparing it to the libraries listed below
Sorting:
- Compares and analyzes GCP IAM roles.☆78Mar 9, 2025Updated last year
- OpenCSPM Community Controls☆14May 18, 2021Updated 4 years ago
- defendA Data Lake. A firehose pipeline to athena providing enrichment and normalization for security events☆17Apr 19, 2023Updated 2 years ago
- ☆65May 21, 2024Updated last year
- Automation associated with our talk: Attacking and Defending Infrastructure with Terraform☆16Jun 5, 2022Updated 3 years ago
- Fun tools around the EBS Direct API☆19Apr 16, 2021Updated 4 years ago
- ☆18Sep 13, 2021Updated 4 years ago
- ☆83Dec 5, 2019Updated 6 years ago
- Terraform provisioning with environment state☆21Nov 28, 2017Updated 8 years ago
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆29Aug 18, 2019Updated 6 years ago
- Exports primitive and predefined GCP IAM Roles and their permissions☆109Mar 2, 2026Updated last week
- Take automated actions against threats and vulnerabilities.☆216Sep 14, 2023Updated 2 years ago
- Xipher is a curated collection of cryptographic primitives put together to perform key/password based asymmetric encryption☆14Mar 2, 2026Updated last week
- Audit log wall of shame.☆42Aug 20, 2025Updated 6 months ago
- ☆46Nov 7, 2024Updated last year
- Command line tool for working with Panther rules and policies☆48Updated this week
- ReWrite of AChoir in Go for Cross Platform forensic artifact collection and processing☆41Feb 28, 2026Updated last week
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆254Nov 18, 2024Updated last year
- ☆44Oct 16, 2025Updated 4 months ago
- ☆10Oct 29, 2021Updated 4 years ago
- Fag ol fra mastern☆10Jul 3, 2019Updated 6 years ago
- Deploy Backup and DR appliances☆12Feb 24, 2026Updated 2 weeks ago
- CuanticoSecurity☆10Sep 7, 2016Updated 9 years ago
- Plugin which auto-subscribes a log delivery lambda function to lambda log groups created by serverless☆12Apr 17, 2023Updated 2 years ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- A microframework based on fasthttp☆12Sep 26, 2023Updated 2 years ago
- A python library for reusing KMS for your own authentication and authorization☆38Sep 28, 2025Updated 5 months ago
- Simple implementation of an AppSec Pipeline using the Gasp library☆13Sep 8, 2019Updated 6 years ago
- This repo contains a list of aws security related talks.☆12Dec 5, 2017Updated 8 years ago
- Transparent proxy server that works as a poor man's VPN. Forwards over ssh. Doesn't require admin. Works with Linux and MacOS. Suppor…☆16Oct 26, 2014Updated 11 years ago
- Data about all known supply-chain attacks through history☆63May 28, 2025Updated 9 months ago
- Python wrapper for the CloudFlare Client API v4☆11May 22, 2017Updated 8 years ago
- Parsec Go client☆12Oct 25, 2022Updated 3 years ago
- Application to create Dynamic Diagrams, mind map representation of the Hierarchical YAML data☆13Sep 22, 2024Updated last year
- A tool to exploit the hash length extension attack in various hashing algorithms☆10Apr 14, 2014Updated 11 years ago
- Go support for parsing, compiling, and installing Chromium OS Seccomp-BPF policy files.☆12Mar 21, 2016Updated 9 years ago
- ☆10Apr 4, 2019Updated 6 years ago
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- Start and stop AWS resources managed by Cloudformation for cost savings☆11Jan 24, 2023Updated 3 years ago