Stars
Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by developing a representation of attack flows, modeling attack flow…
Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)
A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for learning Threat modeling and initial phases of security review.
🚨ATTENTION🚨 The VERIS mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as an archive.
StreamAlert is a serverless, realtime data analysis framework which empowers you to ingest, analyze, and alert on data from any environment, using datasources and alerting logic you define.
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…
Methodology for high-quality web application security testing - https://github.com/tprynn/web-methodology/wiki
Enumerate the permissions associated with AWS credential set
A tool for adding new lines to files, skipping duplicates
The FLARE team's open-source tool to identify capabilities in executable files.
Analyze HTTP requests to minimize risks of HTTP Desync attacks (precursor for HTTP request smuggling/splitting).
CLI tool and library for generating a Software Bill of Materials from container images and filesystems
Simple Sprite Editor for NES Games
A Nmap XSL implementation with Bootstrap.
This is a collection of writeups, cheatsheets, videos, books related to SSRF in one single location
Password-protect URLs using AES in the browser; create hidden bookmarks without a browser extension
Cloud cost estimates for Terraform in pull requests💰📉 Shift FinOps Left!
CloudTracker helps you find over-privileged IAM users and roles by comparing CloudTrail logs with current IAM policies.
In this workshop, you will learn techniques to secure a serverless application built with AWS Lambda, Amazon API Gateway and RDS Aurora. We will cover AWS services and features you can leverage to …
Create agents that monitor and act on your behalf. Your agents are standing by!
DEPRECATED - A prototype SSH configuration and policy scanner (Blog: https://mozilla.github.io/ssh_scan/)
nodejsscan is a static security code scanner for Node.js applications.
Slim(toolkit): Don't change anything in your container image and minify it by up to 30x (and for compiled languages even more) making it secure too! (free and open source)
Simple example using mutual TLS authentication with a Golang server