Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for python cloud security
cloud-security
x
python
x
23 search results found
Awesome Redteam
⭐
3,079
一个攻防知识仓库
Consoleme
⭐
3,025
A Central Control Plane for AWS Permissions and Access
Policy_sentry
⭐
1,906
IAM Least Privilege Policy Generator
Pmapper
⭐
1,290
A tool for quickly evaluating IAM permissions in AWS.
Electriceye
⭐
794
ElectricEye is a multi-cloud, multi-SaaS Python CLI tool for Asset Management, Security Posture Management & Attack Surface Monitoring supporting 100s of services and evaluations to harden your CSP & SaaS environments with controls mapped to over 20 industry, regulatory, and best practice controls frameworks
Vajra
⭐
292
Vajra is a UI-based tool with multiple techniques for attacking and enumerating in the target's Azure and AWS environment. It features an intuitive web-based user interface built with the Python Flask module for a better user experience. The primary focus of this tool is to have different attacking techniques all at one place with web UI interfaces.
Tfquery
⭐
277
tfquery: Run SQL queries on your Terraform infrastructure. Query resources and analyze its configuration using a SQL-powered framework.
Awskeytools
⭐
241
AWS云平台 AccessKey 泄漏利用工具
Cloudgrep
⭐
240
cloudgrep is grep for cloud storage
Hammer
⭐
234
Dow Jones Hammer : Protect the cloud with the power of the cloud(AWS)
Varc
⭐
210
Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of particular use when investigating a security incident.
Aws Allowlister
⭐
208
Automatically compile an AWS Service Control Policy that ONLY allows AWS services that are compliant with your preferred compliance frameworks.
Cloudmarker
⭐
191
Cloud security monitoring tool and framework
Cloud Sniper
⭐
176
Cloud Security Operations Orchestrator
Cloud Validation Framework
⭐
122
prancer platform is an IaC Security engine + Continuous Compliance for your cloud (Azure, AWS, GCP) and Kubernetes environment
Metabadger
⭐
93
Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).
Gator
⭐
57
GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments
Gcp Attack Defense
⭐
53
A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).
Introspector
⭐
52
A schema and set of tools for using SQL to query cloud infrastructure.
Pandorasbox
⭐
51
Security tool to quickly audit Public Box files and folders.
Falco_extended_rules
⭐
49
Curating Falco rules with MITRE ATT&CK Matrix
Awsxenos
⭐
45
AWSXenos will list all the trust relationships in all the IAM roles and S3 buckets
Cdkgoat
⭐
34
CdkGoat is Bridgecrew's "Vulnerable by Design" AWS CDK repository. CdkGoat is a learning and training project that demonstrates how common configuration errors can find their way into production cloud environments.
Eks Creation Engine
⭐
33
The Amazon Elastic Kubernetes Service (EKS) Creation Engine (ECE) is a Python command-line program created by the Lightspin Office of the CISO to facilitate the creation and enablement of secure EKS Clusters.
Gdpatrol
⭐
31
A Lambda-powered Security Orchestration framework for AWS GuardDuty
Aws Sec Tools
⭐
10
Docker container bundling tools for manual AWS security reviews
100 Days Of Cloud
⭐
9
#100DaysOfCloud #100DaysOfCyberSecurity snippets starting from 28 SEPT 2022
Aws Compliancemachinedontstop
⭐
6
Proof of Value Terraform Scripts to utilize Amazon Web Services (AWS) Security, Identity & Compliance Services to Support your AWS Account Security Posture.
Lacework Control Tower Cfn
⭐
6
AWS Control Tower and Lacework allow seamless multi-account cloud security. With Lacework and AWS Control Tower, enrolling a new AWS account now means security best practices and monitoring are automatically applied consistently across your organization. Account administrators can automatically add Lacework's security auditing and monitoring to new AWS accounts. All the required Lacework and AWS account configurations that allow access to AWS configuration and AWS CloudTrail logs are managed for
Secure_ec2
⭐
6
CLI tool that helps you to provision EC2 instances securely
Aws Iam Credential Report
⭐
6
AWS CloudFormation templates and Python code for AWS blog post on how to automate IAM credential reports at scale across AWS.
Cloudpathsniffer
⭐
6
CloudPathSniffer is an open-source, easy to use and extensible Cloud Anomaly Detection platform designed to help security teams to find hard to see risks and undetected attackers in their control plane of cloud environments.
Related Searches
Python Django (28,897)
Python Machine Learning (20,195)
Python Flask (17,643)
Python Dataset (14,792)
Python Docker (14,113)
Python Tensorflow (13,736)
Python Command Line (13,351)
Python Deep Learning (13,092)
Python Jupyter Notebook (12,976)
Python Network (11,495)
1-23 of 23 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.