A library of all the attack scenarios on Amazon S3, and how to mitigate them following a risk-based approach. Intro: See the blog - The last S3 security document that we’ll ever need, and how to use it. Interactive version: Find an interactive version of this content at https://controlcatalog.trustoncloud.com/dashboard/aws/s3. Contact: Email contact@trustoncloud.com or use GitHub issues.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Open Source Intelligence solution for threat intelligence data enrichment and quick analysis of suspicious files or malware.
Darkscope is an AI-powered threat intelligence platform that uses virtual personas to monitor the dark web, social media, and deep web for cyber threats and security risks targeting organizations.
Official repository of YARA rules for threat detection and hunting
Curated datasets for developing and testing detections in SIEM installations.
A project that detects malicious SSL connections by identifying and blacklisting SSL certificates used by botnet C&C servers and identifying JA3 fingerprints to detect and block malware botnet C&C communication.
ZoomEye is an advanced cyberspace search engine that provides detailed information on cyberspace assets, including server software and version information, for cybersecurity experts, researchers, and enterprises.
A nonprofit security organization that collects and shares threat data to make the Internet more secure.
yarAnalyzer creates statistics on a yara rule set and files in a sample directory, generating tables and CSV files, including an inventory feature.
RedEye is a visual analytic tool for enhancing Red and Blue Team operations.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.