AWS
🎨 Diagram as Code for prototyping cloud system architectures
Curated list of links, references, books videos, tutorials (Free or Paid), Exploit, CTFs, Hacking Practices etc. which are related to AWS Security
Building environments to replicate small networks and deploy applications
⛔ (DEPRECATED) Diffy is a triage tool used during cloud-centric security incidents, to help digital forensics and incident response (DFIR) teams quickly identify suspicious hosts on which to focus …
Tool to spray AWS Console IAM Logins
Directory/File, DNS and VHost busting tool written in Go
Interactive visualizations of Terraform dependency graphs using d3.js
Configure AWS credential environment variables for use in other GitHub Actions.
An open source, cloud-native security to protect everything from build to runtime
open source, cloud-native, graph-based asset inventory
A Serverless Security Library for Developers. Regain Control Over Your AWS Lambda & Google Cloud Functions Runtimes.
Help manage AWS systems manager with helpers
The open source high performance ELT framework powered by Apache Arrow
Open Policy Agent (OPA) is an open source, general-purpose policy engine.
♾ Infisical is the open-source secret management platform: Sync secrets across your team/infrastructure, prevent secret leaks, and manage internal PKI
Create your own vulnerable by design AWS penetration testing playground
A simple threat modeling tool to help humans to reduce time-to-value when threat modeling
An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.
The open-source policy-as-code software that provides analysis for Multi-Cloud and SaaS environments, you can get insight with natural language (powered by OpenAI).
Example solutions demonstrating how to implement patterns within the AWS Security Reference Architecture guide using CloudFormation (including Customizations for AWS Control Tower) and Terraform.
Whole-infrastructure automation tooling for AWS
This project contains source code and supporting files to exemplify digital signature and secure message transmission to the Brazilian Instant Payment System (PIX). The architectures represent a pr…