Rogerio Kasa's repositories
Aaia
AWS Identity and Access Management Visualizer and Anomaly Finder
assisted-log-enabler-for-aws
Assisted Log Enabler for AWS - Find AWS resources that are not logging, and turn them on.
AuroraPostgreSQLFailover
Python script to demo aurora postgresql capabilities
aws-auto-remediate
Open source application to instantly remediate common security issues through the use of AWS Config
aws-cloudhsm-cloudformation-template
Automated deployment of AWS CloudHSM resources using AWS CloudFormation
aws-config-rules
[Node, Python, Java] Repository of sample Custom Rules for AWS Config.
aws-container-devsecops-workshop
This workshop is designed to help attendees understand the security concerns of container images and learn how to create a devsecops pipeline for securely building and releasing images.
aws-data-wrangler
Utility belt to handle data on AWS.
aws-waf-sample
This repository contains example scripts and sets of rules for the AWS WAF service. Please be aware that the applicability of these examples to specific workloads may vary.
aws-zerotrust-service2service-workshop
Code for the environment build in the Zero Trust service2service workshop.
beeswithmachineguns
A utility for arming (creating) many bees (micro EC2 instances) to attack (load test) targets (web applications).
BloodHound
Six Degrees of Domain Admin
cloud-custodian
Rules engine for cloud security, cost optimization, and governance, DSL in yaml for policies to query, filter, and take actions on resources
ctf-2019-release
BSidesSF CTF 2019 release
fabric-samples
Read-only mirror of https://gerrit.hyperledger.org/r/#/admin/projects/fabric-samples
iam-identity-center-team
Open-source temporary elevated access solution for AWS IAM Identity Center.
margaritashotgun
Remote Memory Acquisition Tool
medium-to-own-blog
Switch from Medium to your own blog in a few minutes
Mobile-Security-Framework-MobSF
Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.
Real-Time-Voice-Cloning
Clone a voice in 5 seconds to generate arbitrary speech in real-time
ScoutSuite
Multi-Cloud Security Auditing Tool