This is a custom SSM agent which is sorta functional
☆17Jul 5, 2021Updated 4 years ago
Alternatives and similar repositories for ssm-agent-research
Users that are interested in ssm-agent-research are comparing it to the libraries listed below
Sorting:
- Provides an easy way to collect and send Slack access & integration logs.☆13Oct 19, 2021Updated 4 years ago
- Collection of operational focused osquery dashboards.☆11Jan 20, 2021Updated 5 years ago
- A collection of pen-testing/hacking scripts. Various uses.☆13Oct 24, 2020Updated 5 years ago
- ☆17Sep 10, 2021Updated 4 years ago
- This application was built to help reduce the amount of time it takes to review AWS Lambda code.☆61Nov 11, 2024Updated last year
- Scripts to automate standing up hosts in Linode☆15Feb 16, 2021Updated 5 years ago
- Forked and updated with some additional features over the original☆17Mar 30, 2021Updated 4 years ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆49Dec 29, 2023Updated 2 years ago
- Lightweight C# windows agent for Apfell☆17Mar 16, 2020Updated 5 years ago
- A meta-database collecting resources that compile lists of breaches☆21Oct 30, 2025Updated 4 months ago
- Manage GuardDuty At Enterprise Scale☆22Sep 17, 2020Updated 5 years ago
- Gather information on Wiki contributions from IP ranges☆23Jan 21, 2018Updated 8 years ago
- Security Alert Decoration☆27Jul 21, 2025Updated 7 months ago
- ☆15Jul 20, 2022Updated 3 years ago
- AWS STS token decoder☆46Mar 18, 2025Updated 11 months ago
- ☆25May 13, 2019Updated 6 years ago
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behavior☆33Feb 16, 2026Updated 2 weeks ago
- A collection of models for organizing, prioritizing, and understanding cybersecurity and information risk management concepts.☆25Oct 3, 2024Updated last year
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Jan 18, 2022Updated 4 years ago
- ☆34Apr 5, 2017Updated 8 years ago
- It records your terminal, then lets you upload to ASHIRT☆29Updated this week
- Cobalt Strike log state tracking, parsing, and storage☆24Jul 18, 2019Updated 6 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆29Sep 16, 2018Updated 7 years ago
- A toolset to juggle AWS roles for persistent access☆63Aug 14, 2024Updated last year
- A Model Context Protocol server that connects AI assistants like Claude to AWS security services, allowing them to autonomously query, in…☆81Jul 25, 2025Updated 7 months ago
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆29Aug 18, 2019Updated 6 years ago
- A Swift port of some of the original PersistentJXA projects by D00MFist. Original PersistentJXA repo: https://github.com/D00MFist/Persist…☆34Apr 15, 2021Updated 4 years ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆30Aug 11, 2023Updated 2 years ago
- Event Data Collector☆39Jan 12, 2026Updated last month
- AWS SSO serverless phishing API.☆32Jun 30, 2021Updated 4 years ago
- ☆28Aug 6, 2020Updated 5 years ago
- Revised shell script for parsing .gnmap, .xml, or .nmap port scan results files to a CSV list, lists of IPs per port, web urls, and a sum…☆13Apr 17, 2020Updated 5 years ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆74Jun 21, 2024Updated last year
- Kubernetes offensive framework built in eBPF☆39Mar 14, 2023Updated 2 years ago
- ☆30Jan 13, 2026Updated last month
- A logging ASKPASS binary☆29May 29, 2020Updated 5 years ago
- Scans tcl for command injection☆36May 24, 2019Updated 6 years ago
- ☆83Dec 5, 2019Updated 6 years ago