brandon-secid's Stars
protectai/vulnhuntr
Zero shot vulnerability discovery using LLMs
Hacking-the-Cloud/hackingthe.cloud
An encyclopedia for offensive and defensive security knowledge in cloud native technologies.
planetscale/cloudranger
Go library for mapping IP address ranges to cloud provider regions (currently: AWS and GCP)
edera-dev/am-i-isolated
Validate the isolation posture of your container environment.
usebruno/bruno
Opensource IDE For Exploring and Testing Api's (lightweight alternative to postman/insomnia)
awslabs/cedar-access-control-for-k8s
Cedar for Kubernetes brings the power of Cedar to Kubernetes authorization and admission validation, showing how cluster administrators can enable a unified access control language for principals making API calls and giving policy authors a single language to write and reason about
yanilov/control-tags
Scalable integrity framework for ABAC on AWS
HarshVaragiya/aws-redteam-kit
A PoC to Simulate Ransomware Attack on AWS Environment
PaperMtn/slack-watchman
Slack enumeration and exposed secrets detection tool
saw-your-packet/CloudShovel
A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where we scanned 20k+ public AMIs.
awslabs/threat-composer
A simple threat modeling tool to help humans to reduce time-to-value when threat modeling
xvnpw/ai-threat-modeling-action
AI featured threat modeling and security review action
CCob/okta-terrify
Okta Verify and Okta FastPass Abuse Tool
padok-team/cognito-scanner
A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalation
amancevice/terraform-aws-slackbot
Serverless Extensible Slackbot
boostsecurityio/poutine
boostsecurityio/poutine
openai/openai-security-bots
github/contributors
GitHub Action that given an organization or repository, produces information about the contributors over the specified time period.
ovotech/cloud-key-rotator
A Golang program to rotate AWS & GCP account keys
C0axx/CanaryHunter
Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org
pushsecurity/saas-attacks
Offensive security drives defensive security. We're sharing a collection of SaaS attack techniques to help defenders understand the threats they face. #nolockdown
sofienkaabar/deep-learning-for-finance
The Official Repository of Deep Learning for Finance
aws-samples/aws-customer-playbook-framework
This repository provides sample templates for security playbooks against various scenarios when using Amazon Web Services.
welldone-cloud/aws-scps-for-sandbox-and-training-accounts
trufflesecurity/WhoAmISlack
Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.
shindan-io/scnr
deep file scanner tool
fwdcloudsec/known_aws_accounts
List of known AWS accounts
google/localtoast
aws-samples/ipv4-usage-monitoring-for-aws
synacktiv/nord-stream
Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently supports Azure DevOps, GitHub and GitLab.