This is a custom SSM agent which is sorta functional
☆17Jul 5, 2021Updated 4 years ago
Alternatives and similar repositories for ssm-agent-research
Users that are interested in ssm-agent-research are comparing it to the libraries listed below
Sorting:
- Provides an easy way to collect and send Slack access & integration logs.☆13Oct 19, 2021Updated 4 years ago
- ☆17Sep 10, 2021Updated 4 years ago
- A collection of pen-testing/hacking scripts. Various uses.☆13Oct 24, 2020Updated 5 years ago
- This application was built to help reduce the amount of time it takes to review AWS Lambda code.☆61Nov 11, 2024Updated last year
- Scripts to automate standing up hosts in Linode☆15Feb 16, 2021Updated 5 years ago
- Forked and updated with some additional features over the original☆17Mar 30, 2021Updated 4 years ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- Gordon is status check Github app to enforce and validate about.yaml file specifications in a repository during pull requests to drive co…☆20Feb 4, 2025Updated last year
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆49Dec 29, 2023Updated 2 years ago
- Lightweight C# windows agent for Apfell☆17Mar 16, 2020Updated 5 years ago
- A meta-database collecting resources that compile lists of breaches☆21Oct 30, 2025Updated 4 months ago
- Gather information on Wiki contributions from IP ranges☆23Jan 21, 2018Updated 8 years ago
- Security Alert Decoration☆27Jul 21, 2025Updated 7 months ago
- ☆15Jul 20, 2022Updated 3 years ago
- ☆25May 13, 2019Updated 6 years ago
- A collection of models for organizing, prioritizing, and understanding cybersecurity and information risk management concepts.☆25Oct 3, 2024Updated last year
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behavior☆33Feb 16, 2026Updated 2 weeks ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Jan 18, 2022Updated 4 years ago
- ☆34Apr 5, 2017Updated 8 years ago
- It records your terminal, then lets you upload to ASHIRT☆29Mar 2, 2026Updated last week
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆35Jul 22, 2021Updated 4 years ago
- A toolset to juggle AWS roles for persistent access☆63Aug 14, 2024Updated last year
- A Model Context Protocol server that connects AI assistants like Claude to AWS security services, allowing them to autonomously query, in…☆81Jul 25, 2025Updated 7 months ago
- Event Data Collector☆39Jan 12, 2026Updated last month
- A Swift port of some of the original PersistentJXA projects by D00MFist. Original PersistentJXA repo: https://github.com/D00MFist/Persist…☆34Apr 15, 2021Updated 4 years ago
- AWS SSO serverless phishing API.☆32Jun 30, 2021Updated 4 years ago
- ☆28Aug 6, 2020Updated 5 years ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆74Jun 21, 2024Updated last year
- Revised shell script for parsing .gnmap, .xml, or .nmap port scan results files to a CSV list, lists of IPs per port, web urls, and a sum…☆13Apr 17, 2020Updated 5 years ago
- ☆30Jan 13, 2026Updated last month
- Visualize your Terraform files☆34Sep 9, 2020Updated 5 years ago
- Kubernetes offensive framework built in eBPF☆39Mar 14, 2023Updated 2 years ago
- A logging ASKPASS binary☆29May 29, 2020Updated 5 years ago
- Scans tcl for command injection☆36May 24, 2019Updated 6 years ago
- ☆83Dec 5, 2019Updated 6 years ago
- OpenCTI Add-On for Splunk☆13Jan 13, 2026Updated last month
- Agentic Engineering Guide☆52Updated this week
- SELinux Policies for Vault☆37Feb 20, 2026Updated 2 weeks ago
- Payload designed for targeting Jamf enrolled devices.☆39May 19, 2023Updated 2 years ago