KennaSecurity / toolkitLinks
Kenna Security API and Scripting Toolkit
☆34Updated 3 months ago
Alternatives and similar repositories for toolkit
Users that are interested in toolkit are comparing it to the libraries listed below
Sorting:
- Maturity Model Collaborative project☆15Updated 2 years ago
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆62Updated this week
- ☆14Updated last week
- Fun tools around the EBS Direct API☆19Updated 4 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆78Updated 3 years ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Updated 3 years ago
- InfoSec OpenAI Examples☆19Updated 2 years ago
- Virtual Security Operations Center☆52Updated 2 years ago
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.☆111Updated 5 years ago
- A public cloud security knowledgebase - https://www.secwiki.cloud/☆52Updated last year
- ☆114Updated 2 years ago
- ☆23Updated last year
- AWS SSO serverless phishing API.☆32Updated 4 years ago
- Dependency Combobulator☆94Updated last year
- Static Token And Credential Scanner☆95Updated 2 years ago
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Updated 2 years ago
- WAF bypass PoC☆49Updated 2 years ago
- ☆60Updated 2 years ago
- Serverless honeytoken 🕵🏻♂️☆81Updated 2 years ago
- A small library to alter AWS API requests; Used for fuzzing research☆22Updated 2 years ago
- ☆10Updated 3 years ago
- Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/)☆89Updated 3 years ago
- ☆14Updated 3 years ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Updated 4 years ago
- Salesforce Policy Deviation Checker☆30Updated 5 years ago
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by use…☆73Updated 3 years ago
- Scanner to identify dangling DNS records and subdomain takeovers☆50Updated last year
- Global Security Database Tools☆43Updated 2 years ago
- ☆31Updated last week
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆24Updated 4 years ago