☆25Jun 27, 2024Updated last year
Alternatives and similar repositories for active-assist
Users that are interested in active-assist are comparing it to the libraries listed below
Sorting:
- ☆18Jul 30, 2024Updated last year
- Compares and analyzes GCP IAM roles.☆78Mar 9, 2025Updated 11 months ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- Public repository to provide guidance and examples for people to start learning IaC. This repository also contains some open-hack style l…☆23Jun 14, 2023Updated 2 years ago
- ☆28Dec 26, 2025Updated 2 months ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 10 months ago
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- ☆14Jan 8, 2026Updated last month
- Harness the security superpowers of your cloud asset inventory☆11Sep 22, 2024Updated last year
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆88Jan 28, 2024Updated 2 years ago
- Stats about HTTP response security headers usage mentioned by the OSHP.☆17Jan 25, 2026Updated last month
- Deliberately vulnerable AWS resources for security assessment demos☆32Aug 20, 2022Updated 3 years ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆59Sep 7, 2023Updated 2 years ago
- Repository to archive GCP Documentation for local use☆16Feb 11, 2025Updated last year
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆39Sep 25, 2024Updated last year
- Gordon is status check Github app to enforce and validate about.yaml file specifications in a repository during pull requests to drive co…☆20Feb 4, 2025Updated last year
- ☆40Nov 29, 2024Updated last year
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆49Dec 29, 2023Updated 2 years ago
- CloudSplaining on AWS Managed Policies☆44Sep 8, 2025Updated 5 months ago
- ☆124May 26, 2025Updated 9 months ago
- Convert cloudtrail data to MITRE ATT&CK Sightings☆82Jul 25, 2022Updated 3 years ago
- A tool to check the security settings of Github Organizations.☆75Feb 9, 2026Updated 3 weeks ago
- Modular Kubernetes lab which provides an easy and streamlined way to deploy a test cluster with support for different components.☆53Oct 2, 2025Updated 5 months ago
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆61Feb 5, 2025Updated last year
- Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).☆144May 1, 2025Updated 10 months ago
- ☆51Jun 13, 2024Updated last year
- ☆17Jan 3, 2021Updated 5 years ago
- Security Alert Decoration☆27Jul 21, 2025Updated 7 months ago
- A PoC exploit for CVE-2022-41622 - a CSRF in F5 BIG-IP control plane that leads to remote root☆21Oct 20, 2022Updated 3 years ago
- AWS honey token manager☆89Aug 1, 2024Updated last year
- ☆49Mar 21, 2023Updated 2 years ago
- Everything Application Security☆27Feb 18, 2026Updated 2 weeks ago
- A GitHub Actions Supply Chain CTF / Goat☆27Jan 6, 2026Updated last month
- This application was built to help reduce the amount of time it takes to review AWS Lambda code.☆61Nov 11, 2024Updated last year
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behavior☆33Feb 16, 2026Updated 2 weeks ago
- Protect against subdomain takeover☆95Jul 20, 2025Updated 7 months ago
- Python script for collecting and visualising Google Cloud Platform IAM permissions☆51Apr 23, 2017Updated 8 years ago
- An Evil OIDC Server☆53Oct 19, 2022Updated 3 years ago
- Knowledge Report Alert & Normalization Generator☆26Feb 11, 2026Updated 2 weeks ago