Outil de sécurité des architectures kubernetes avancées
☆78Nov 27, 2025Updated 3 months ago
Alternatives and similar repositories for OSAKA
Users that are interested in OSAKA are comparing it to the libraries listed below
Sorting:
- An opensource solution to track events in platform☆22Updated this week
- Interactive simulation of a fictional ransomware group's dashboard☆12Sep 30, 2024Updated last year
- ☆11Apr 7, 2022Updated 3 years ago
- Challenge Instances on Demand, anywhere at any time☆37Updated this week
- Protect your data in minutes !☆125Nov 5, 2024Updated last year
- ☆14Sep 1, 2024Updated last year
- ☆29May 12, 2025Updated 9 months ago
- 📦 A GitHub Action that performs a security scan of your GitHub Actions.☆26Oct 28, 2024Updated last year
- PyRASP is a Runtime Application Self Protection package for Python-based Web Servers (Flask, FastAPI and Django), Serverless Functions (A…☆33Nov 15, 2025Updated 3 months ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆34Jun 27, 2025Updated 8 months ago
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securit…☆37Oct 17, 2024Updated last year
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Feb 10, 2022Updated 4 years ago
- Breizh CTF 2024 - Challenges☆14Jun 5, 2024Updated last year
- Repository to archive GCP Documentation for local use☆16Feb 11, 2025Updated last year
- Specialized testing tool designed to identify vulnerabilities and bugs in OPC UA (Open Platform Communications Unified Architecture) impl…☆43Feb 4, 2026Updated last month
- Extract, gather and analyze information from an Android Manifest file or an APK.☆19Jun 9, 2023Updated 2 years ago
- An example of how to package Coreboot in Nix☆19May 3, 2021Updated 4 years ago
- Homographs: brutefind homographs within a font☆19Apr 21, 2017Updated 8 years ago
- ☆93Dec 15, 2025Updated 2 months ago
- Hardening Active Directory version 2☆377Dec 10, 2025Updated 2 months ago
- Détection d'anomalie à partir des journaux d'authentification Windows☆18Apr 16, 2021Updated 4 years ago
- Proof-of-concept implementation for the paper "Indirect Meltdown: Building Novel Side-Channel Attacks from Transient Execution Attacks" (…☆22Sep 24, 2023Updated 2 years ago
- ☆17Aug 29, 2022Updated 3 years ago
- NATS auth management platform☆29Feb 8, 2026Updated last month
- Helps you resize pods created by a DaemonSet depending on the amount of allocatable resources present on the node.☆23Jul 18, 2025Updated 7 months ago
- ☆27May 6, 2024Updated last year
- ArchLinux setup which focuses on desktop security☆47Apr 15, 2025Updated 10 months ago
- Tool for building Kubernetes attack paths☆945Updated this week
- Vigrid is a Cyber Range redesign of the GNS3 tool able to virtualize almost any physical device on many CPU. It is also able to virtualiz…☆23Updated this week
- BOF (Boiboite Opener Framework) is a testing framework for industrial protocols implementations and devices.☆52Feb 14, 2025Updated last year
- A library and cli tool to extract HWP files.☆30Dec 1, 2025Updated 3 months ago
- Octoscan is a static vulnerability scanner for GitHub action workflows.☆245Dec 8, 2025Updated 3 months ago
- ☆166Nov 3, 2025Updated 4 months ago
- Curated list of resources on HashiCorp's Packer☆30Oct 8, 2022Updated 3 years ago
- BreizhCTF 2023 - Challenges☆25Mar 23, 2023Updated 2 years ago
- Discover the Best Hardening Options for Systemd Services in NixOS☆26May 13, 2022Updated 3 years ago
- ☆23Apr 11, 2024Updated last year
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- Kubernetes Easter CTF☆59Jul 10, 2020Updated 5 years ago