ANSSI-FR / OSAKAView external linksLinks
Outil de sécurité des architectures kubernetes avancées
☆74Nov 27, 2025Updated 2 months ago
Alternatives and similar repositories for OSAKA
Users that are interested in OSAKA are comparing it to the libraries listed below
Sorting:
- Interactive simulation of a fictional ransomware group's dashboard☆12Sep 30, 2024Updated last year
- ☆11Apr 7, 2022Updated 3 years ago
- Challenge Instances on Demand, anywhere at any time☆32Feb 6, 2026Updated last week
- Outil automatisé de création de LAN☆12Feb 2, 2023Updated 3 years ago
- Protect your data in minutes !☆127Nov 5, 2024Updated last year
- ☆28May 12, 2025Updated 9 months ago
- ☆14Sep 1, 2024Updated last year
- 📦 A GitHub Action that performs a security scan of your GitHub Actions.☆25Oct 28, 2024Updated last year
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆34Jun 27, 2025Updated 7 months ago
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securit…☆37Oct 17, 2024Updated last year
- Breizh CTF 2024 - Challenges☆14Jun 5, 2024Updated last year
- Repository to archive GCP Documentation for local use☆16Feb 11, 2025Updated last year
- Specialized testing tool designed to identify vulnerabilities and bugs in OPC UA (Open Platform Communications Unified Architecture) impl…☆43Feb 4, 2026Updated last week
- NATS auth management platform☆24Feb 6, 2026Updated last week
- An example of how to package Coreboot in Nix☆19May 3, 2021Updated 4 years ago
- Homographs: brutefind homographs within a font☆19Apr 21, 2017Updated 8 years ago
- Extract, gather and analyze information from an Android Manifest file or an APK.☆19Jun 9, 2023Updated 2 years ago
- ☆94Dec 15, 2025Updated 2 months ago
- Hardening Active Directory version 2☆376Dec 10, 2025Updated 2 months ago
- Détection d'anomalie à partir des journaux d'authentification Windows☆18Apr 16, 2021Updated 4 years ago
- ☆17Aug 29, 2022Updated 3 years ago
- Helps you resize pods created by a DaemonSet depending on the amount of allocatable resources present on the node.☆23Jul 18, 2025Updated 6 months ago
- Powershell script for Windows to retrieve the authentication hardening status of DCOM applications☆23Jan 15, 2023Updated 3 years ago
- ☆26May 6, 2024Updated last year
- ArchLinux setup which focuses on desktop security☆46Apr 15, 2025Updated 10 months ago
- Tool for building Kubernetes attack paths☆940Jan 16, 2026Updated 3 weeks ago
- Docker auditing and enumeration script.☆22Oct 7, 2019Updated 6 years ago
- @crossplane provider for @kubernetes-sigs Cluster API☆20Nov 29, 2020Updated 5 years ago
- BOF (Boiboite Opener Framework) is a testing framework for industrial protocols implementations and devices.☆52Feb 14, 2025Updated last year
- Vigrid is a Cyber Range redesign of the GNS3 tool able to virtualize almost any physical device on many CPU. It is also able to virtualiz…☆23Sep 26, 2025Updated 4 months ago
- A library and cli tool to extract HWP files.☆30Dec 1, 2025Updated 2 months ago
- Octoscan is a static vulnerability scanner for GitHub action workflows.☆243Dec 8, 2025Updated 2 months ago
- ☆166Nov 3, 2025Updated 3 months ago
- Curated list of resources on HashiCorp's Packer☆30Oct 8, 2022Updated 3 years ago
- Discover the Best Hardening Options for Systemd Services in NixOS☆26May 13, 2022Updated 3 years ago
- ☆23Apr 11, 2024Updated last year
- ☆27May 3, 2025Updated 9 months ago
- BreizhCTF 2023 - Challenges☆27Mar 23, 2023Updated 2 years ago
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago