Miserlou / Mackenzie
AWS Lambda Infection Toolkit // Persistent Lambda Malware PoC
☆159Updated 8 years ago
Alternatives and similar repositories for Mackenzie
Users that are interested in Mackenzie are comparing it to the libraries listed below
Sorting:
- Mittn: Security test tool runner for test automation in CI☆195Updated last year
- INACTIVE - Collection of Tools & Procedures for double checking GitHub configurations☆138Updated last year
- a grep -r for secrets☆178Updated 3 years ago
- honeyλ - a simple, serverless application designed to create and monitor fake HTTP endpoints (i.e. URL honeytokens) automatically, on top…☆517Updated 6 years ago
- A number of Recipes for AWS☆194Updated 6 years ago
- AWS Metadata Proxy for protection against SSRF☆68Updated 5 years ago
- Minion☆354Updated 6 years ago
- Rate Limiting using Cloud Resources☆20Updated 8 years ago
- A collection of scripts that help handling X.509 certificate and TLS issues☆128Updated 3 months ago
- AWS risky security change detector based on EDDA.☆82Updated 6 years ago
- drydock provides a flexible way of assessing the security of your Docker daemon configuration and containers using editable audit templat…☆65Updated 9 years ago
- DEPRECATED — Self Service AWS IAM Policies for dev at scale☆58Updated 9 years ago
- Tool used to continuously monitor a Github org for mistaken public commits☆165Updated 9 years ago
- Threat Specification Language☆28Updated 9 years ago
- Certificate Transparency Log aggregation, parsing, and streaming service☆102Updated 7 years ago
- A high entropy string plugin for OpenStack's bandit project☆48Updated 3 years ago
- Evident Security Platform Custom Signatures Samples☆28Updated 6 years ago
- Checks AWS CloudFormation templates for security, reliability and conformity☆43Updated 4 years ago
- INACTIVE - Security Testing Tool☆107Updated 9 years ago
- Jump to Full Encryption☆61Updated 8 years ago
- Kubernetes Auto Analyzer☆191Updated 5 years ago
- A docker based honeypot.☆149Updated 10 years ago
- A static-code-analysis tool for performing security-focused code reviews. It enables an auditor to swiftly map the attack-surface of a la…☆139Updated 10 months ago
- Configuration to use gpg smartcards for ssh authentication☆158Updated 7 years ago
- Continuous Integration and Development ExploiteR☆85Updated 2 years ago
- 🔐💥 KeyNuker - nuke AWS keys accidentally leaked to Github☆90Updated 6 years ago
- A monitoring service for Certificate Transparency☆32Updated 2 years ago
- Example detection of compromise credentials in AWS☆122Updated 6 years ago
- Hardening and Auditing Tool For Docker Hosts & Containers☆68Updated 9 years ago
- Freely available cryptographic iconography☆66Updated 8 years ago