Miserlou / MackenzieLinks
AWS Lambda Infection Toolkit // Persistent Lambda Malware PoC
☆159Updated 8 years ago
Alternatives and similar repositories for Mackenzie
Users that are interested in Mackenzie are comparing it to the libraries listed below
Sorting:
- Mittn: Security test tool runner for test automation in CI☆196Updated last year
- A number of Recipes for AWS☆192Updated 6 years ago
- honeyλ - a simple, serverless application designed to create and monitor fake HTTP endpoints (i.e. URL honeytokens) automatically, on top…☆518Updated 6 years ago
- a grep -r for secrets☆178Updated 3 years ago
- AWS risky security change detector based on EDDA.☆82Updated 6 years ago
- INACTIVE - Security Testing Tool☆107Updated 9 years ago
- Minion☆355Updated 6 years ago
- INACTIVE - Collection of Tools & Procedures for double checking GitHub configurations☆137Updated last year
- Kubernetes Auto Analyzer☆191Updated 5 years ago
- Db Database Assessment Tool☆210Updated 7 years ago
- Enforce ownership and data security within AWS☆448Updated 4 years ago
- Tool used to continuously monitor a Github org for mistaken public commits☆166Updated 9 years ago
- AWS Auditing & Hardening Tool☆710Updated 5 years ago
- A docker based honeypot.☆150Updated 10 years ago
- Rate Limiting using Cloud Resources☆20Updated 8 years ago
- Threat Specification Language☆28Updated 9 years ago
- drydock provides a flexible way of assessing the security of your Docker daemon configuration and containers using editable audit templat…☆65Updated 9 years ago
- A tool for auditing security properties of GCP projects.☆159Updated 7 years ago
- SeaSponge is an accessible threat modelling tool from Mozilla☆279Updated 7 years ago
- RFC 6238 TOTP + knockd = awesome!☆56Updated 9 years ago
- Git plugin that prevents sensitive data from being committed.☆315Updated 4 years ago
- Flashpaper is a simple go-based service for creating one time use links to text data or individual files.☆151Updated last year
- Google Cloud Platform Security Tool☆234Updated 6 years ago
- An application to assist in the organization and prioritization of software security activities.☆139Updated 4 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆313Updated 8 years ago
- Tools for fingerprinting and exploiting Amazon cloud infrastructures☆479Updated 2 years ago
- Jump to Full Encryption☆61Updated 8 years ago
- A collection of Ansible roles for automating infosec builds.☆92Updated 7 years ago
- dockscan is security vulnerability and audit scanner for Docker installations☆219Updated 9 years ago
- The foghorn project is a DNS proxy intended to reduce user exposure to phishing and other malicious items that can be interdicted by DNS …☆139Updated 8 years ago