awesome-cloud-native-securityawesome resources about cloud native security 🐿
Stars: ✭ 233 (+1065%)
Mutual labels: cloud-security, kubernetes-security
sgCheckupsgCheckup generates nmap output based on scanning your AWS Security Groups for unexpected open ports.
Stars: ✭ 77 (+285%)
Mutual labels: cloud-security
master-thesisВыпускная квалификационная работа (ВКР) магистра в LaTeX, оформленная в соответствии с нормоконтролем Севастопольского государственного университета в 2017 г.
Stars: ✭ 84 (+320%)
Mutual labels: cloud-security
policy-serverWebhook server that evaluates WebAssembly policies to validate Kubernetes requests
Stars: ✭ 111 (+455%)
Mutual labels: kubernetes-security
awesome-cloud-security🛡️ Awesome Cloud Security Resources ⚔️
Stars: ✭ 1,056 (+5180%)
Mutual labels: cloud-security
awesome-kubernetes-securityA curated list of awesome Kubernetes security resources
Stars: ✭ 775 (+3775%)
Mutual labels: kubernetes-security
Kube BenchChecks whether Kubernetes is deployed according to security best practices as defined in the CIS Kubernetes Benchmark
Stars: ✭ 4,359 (+21695%)
Mutual labels: kubernetes-security
k0otkitk0otkit is a universal post-penetration technique which could be used in penetrations against Kubernetes clusters.
Stars: ✭ 217 (+985%)
Mutual labels: kubernetes-security
ConsolemeA Central Control Plane for AWS Permissions and Access
Stars: ✭ 2,631 (+13055%)
Mutual labels: cloud-security
TerrascanDetect compliance and security violations across Infrastructure as Code to mitigate risk before provisioning cloud native infrastructure.
Stars: ✭ 2,687 (+13335%)
Mutual labels: cloud-security
AriaCloudA Docker container for remote penetration testing.
Stars: ✭ 105 (+425%)
Mutual labels: cloud-security
Free Security EbooksFree Security and Hacking eBooks
Stars: ✭ 3,132 (+15560%)
Mutual labels: cloud-security
metabadgerPrevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).
Stars: ✭ 123 (+515%)
Mutual labels: cloud-security
iamzeroIdentity & Access Management simplified and secure.
Stars: ✭ 192 (+860%)
Mutual labels: cloud-security
AWSXenosAWSXenos will list all the trust relationships in all the IAM roles and S3 buckets
Stars: ✭ 57 (+185%)
Mutual labels: cloud-security
CheckovPrevent cloud misconfigurations during build-time for Terraform, Cloudformation, Kubernetes, Serverless framework and other infrastructure-as-code-languages with Checkov by Bridgecrew.
Stars: ✭ 3,572 (+17760%)
Mutual labels: kubernetes-security
CloudFrontierMonitor the internet attack surface of various public cloud environments. Currently supports AWS, GCP, Azure, DigitalOcean and Oracle Cloud.
Stars: ✭ 102 (+410%)
Mutual labels: cloud-security
cdkgoatCdkGoat is Bridgecrew's "Vulnerable by Design" AWS CDK repository. CdkGoat is a learning and training project that demonstrates how common configuration errors can find their way into production cloud environments.
Stars: ✭ 27 (+35%)
Mutual labels: cloud-security
tfquerytfquery: Run SQL queries on your Terraform infrastructure. Query resources and analyze its configuration using a SQL-powered framework.
Stars: ✭ 297 (+1385%)
Mutual labels: cloud-security
introspectorA schema and set of tools for using SQL to query cloud infrastructure.
Stars: ✭ 61 (+205%)
Mutual labels: cloud-security