☆25Jun 27, 2024Updated last year
Alternatives and similar repositories for active-assist
Users that are interested in active-assist are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Compares and analyzes GCP IAM roles.☆78Mar 9, 2025Updated last year
- Harness the security superpowers of your cloud asset inventory☆11Sep 22, 2024Updated last year
- ☆18Jul 30, 2024Updated last year
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- Terraform module for extracting Autoscaling group IPs☆12Dec 2, 2017Updated 8 years ago
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- Remove EXIF data from all objects in an S3 bucket☆16Mar 16, 2021Updated 5 years ago
- Docker configuration for the Subsonic Media Streamer using Alpine Linux☆12May 2, 2020Updated 5 years ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆89Jan 28, 2024Updated 2 years ago
- Python script for collecting and visualising Google Cloud Platform IAM permissions☆51Apr 23, 2017Updated 8 years ago
- What kind of scaffolding it takes to run Chef with no Internet access☆11May 9, 2017Updated 8 years ago
- GCP PCI-DSS 3.2.1 InSpec Profile☆18May 26, 2021Updated 4 years ago
- GKE CIS 1.1.0 Benchmark InSpec Profile☆25Sep 7, 2021Updated 4 years ago
- ☆28Dec 26, 2025Updated 2 months ago
- Threat Hunting at Scale: Auditing Thousands of Clusters With Falco + Fluent☆12Aug 13, 2022Updated 3 years ago
- ☆169Sep 30, 2025Updated 5 months ago
- An Evil OIDC Server☆53Oct 19, 2022Updated 3 years ago
- A bash script that performs backups and maintenance on your MySQL servers☆32Dec 14, 2015Updated 10 years ago
- Deliberately vulnerable AWS resources for security assessment demos☆32Aug 20, 2022Updated 3 years ago
- Helm plugin which performs backup/restore of releases in a namespace to/from a file☆84Mar 4, 2021Updated 5 years ago
- ☆20Jan 12, 2022Updated 4 years ago
- ☆11Jun 23, 2022Updated 3 years ago
- Convert cloudtrail data to MITRE ATT&CK Sightings☆82Jul 25, 2022Updated 3 years ago
- Python on CoreOS. works well with ansible.☆24Oct 1, 2018Updated 7 years ago
- ☆16May 15, 2024Updated last year
- Utilities for programmatic analysis of Cartography data.☆40Mar 2, 2026Updated 3 weeks ago
- Repository to archive GCP Documentation for local use☆16Feb 11, 2025Updated last year
- CloudSplaining on AWS Managed Policies☆44Sep 8, 2025Updated 6 months ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 11 months ago
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆39Sep 25, 2024Updated last year
- ☆14Apr 14, 2023Updated 2 years ago
- ☆124May 26, 2025Updated 9 months ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆59Sep 7, 2023Updated 2 years ago
- AWS honey token manager☆90Aug 1, 2024Updated last year
- Stats about HTTP response security headers usage mentioned by the OSHP.☆17Jan 25, 2026Updated last month
- ☆14Jan 8, 2026Updated 2 months ago
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆49Dec 29, 2023Updated 2 years ago
- Provides a prometheus exporter for monitoring aspects secrets stored on a running HashiCorp Vault server☆32Oct 21, 2023Updated 2 years ago
- Security Alert Decoration☆27Jul 21, 2025Updated 8 months ago