AP's repositories
tenableplugins
Scraps all Tenable plugins
audit-userspace
Linux audit userspace repository
aws-scp-templates
repo for templates of AWS Service Control Policies
aws_warchest
Collection of Terraform, Cloudformation and Serverless Framework Resources and Modules for AWS
chatgpt-streamlit-demo
Streamlining AI/ML Implementation with ChatGPT and AWS: A Step-by-Step Guide to Prototyping and Deploying a Chatbot on AWS ECS Fargate
cloudformation-guard
Guard offers a policy-as-code domain-specific language (DSL) to write rules and validate JSON- and YAML-formatted data such as CloudFormation Templates, K8s configurations, and Terraform JSON plans/configurations against those rules.
compliant-framework-for-federal-and-dod-workloads-in-aws-govcloud-us
This solution enables you to quickly deploy a secure, scalable, multi-account environment in AWS GovCloud (US) based on AWS best practices. This solution is architected to follow the Defense Information Systems Agency (DISA) Cloud Computing Security Requirements Guide (SRG) for hosting Impact Level (IL) 4 and 5 workloads in the cloud. Using the Compliant Framework solution, you are able to quickly deploy an architecture baseline that accommodates U.S. federal and Department of Defense (DoD) requirements to rapidly achieve Authority to Operate (ATO). In addition, the Compliant Framework solution is also architected to support Cybersecurity Maturity Model Certification (CMMC) readiness.
detection-rules
custom detection logic in SIGMA rules that can be used to translate to any desire log source.
resource-auto-tagger
WARNING - This package is no longer supported. Source code & IAM policies for AWS Lambda function described in "Automatically tag new AWS resources based on identity or role" blog post.
trufflehog
Find credentials all over the place
my-arsenal-of-aws-security-tools
List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.
Nessus_app
Application to parse nessus results and automates RMF
siem-on-amazon-opensearch-service
A solution for collecting, correlating and visualizing multiple types of logs to help investigate security incidents.
sigma-rules
Collection of custom sigma rules.
sigma-rules-1
For custom sigma rules
sigma-rules-2
Sigma rules from Joe Security
sigma-rules-contribution
Custom detection rules written in SIGMA format
SSH-Snake
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
WebScraper
WebScrapper