Statistics for topic cloud-security
RepositoryStats tracks 633,100 Github repositories, of these 77 are tagged with the cloud-security topic. The most common primary language for repositories using this topic is Python (23). Other languages include: Go (17)
Stargazers over time for topic cloud-security
Most starred repositories for topic cloud-security (view more)
Trending repositories for topic cloud-security (view more)
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
Skills and career roadmap for various security roles like application security, cloud security, DevSecOps, security engineer, security researchers, pentesting, api security, network security, mobile s...
Detect compliance and security violations across Infrastructure as Code to mitigate risk before provisioning cloud native infrastructure.
Skills and career roadmap for various security roles like application security, cloud security, DevSecOps, security engineer, security researchers, pentesting, api security, network security, mobile s...
Focused malicious code detection ruleset, with a high protection-to-noise ratio
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
An encyclopedia for offensive and defensive security knowledge in cloud native technologies.
Detect compliance and security violations across Infrastructure as Code to mitigate risk before provisioning cloud native infrastructure.
Focused malicious code detection ruleset, with a high protection-to-noise ratio
MAAD Attack Framework - An attack tool for simple, fast & effective security testing of M365 & Entra ID (Azure AD).
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
An encyclopedia for offensive and defensive security knowledge in cloud native technologies.
:cloud: :zap: Granular, Actionable Adversary Emulation for the Cloud
Leverage Ollion's GCP Landing Zone to deploy a secure, compliant foundation with ease. The repository contains an implementation of a secure and compliant landing zone pattern that will help expedite ...
Focused malicious code detection ruleset, with a high protection-to-noise ratio
An encyclopedia for offensive and defensive security knowledge in cloud native technologies.
Cyber-Security Bible! Theory and Tools, Kali Linux, Penetration Testing, Bug Bounty, CTFs, Malware Analysis, Cryptography, Secure Programming, Web App Security, Cloud Security, Devsecops, Ethical Hack...
opensecurity: open-source security and compliance. See and secure your cloud, containers, code, networks, deployments, devices. Define your rules, get precise checks, fix gaps fast. Streamlined audits...
Focused malicious code detection ruleset, with a high protection-to-noise ratio
Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for precise detection and notification specifically for honeyservices ...
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on playground 🚀
opensecurity: open-source security and compliance. See and secure your cloud, containers, code, networks, deployments, devices. Define your rules, get precise checks, fix gaps fast. Streamlined audits...
An encyclopedia for offensive and defensive security knowledge in cloud native technologies.
Query, provision and operate Cloud and SaaS resources and APIs using an extensible SQL based framework
Query, provision and operate Cloud and SaaS resources and APIs using an extensible SQL based framework
Leverage Ollion's GCP Landing Zone to deploy a secure, compliant foundation with ease. The repository contains an implementation of a secure and compliant landing zone pattern that will help expedite ...
An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and security implications