Netflix-Skunkworks / cloudy-krakenView external linksLinks
AWS Red Team Orchestration Framework
☆101Jul 26, 2017Updated 8 years ago
Alternatives and similar repositories for cloudy-kraken
Users that are interested in cloudy-kraken are comparing it to the libraries listed below
Sorting:
- Application Layer DoS Testing Framework☆271Jul 30, 2017Updated 8 years ago
- A library for efficient interception of established TCP connections☆20Oct 12, 2015Updated 10 years ago
- Github action for linting AWS IAM policy documents☆38Jan 20, 2023Updated 3 years ago
- Current development for Call Map takes place at https://github.com/ajylee/call_map. Call Map is a tool for navigating Python call graphs.…☆29Jul 31, 2021Updated 4 years ago
- An eBPF detection program for CVE-2022-0847☆29Jul 5, 2022Updated 3 years ago
- A very simple CGI script to bridge a channel between multiple Slack instances. Yes. A CGI script. Why? because it's trivially simple.☆12Oct 9, 2015Updated 10 years ago
- EternalBlue/DoublePulsar python wrapper☆10Nov 22, 2017Updated 8 years ago
- Create temporary login session for AWS CLI☆11Nov 6, 2019Updated 6 years ago
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- Stealth is a File Integrity scanner performing its work in a stealthy way.☆12Jun 25, 2018Updated 7 years ago
- Example Express application for collecting data from the Stethoscope app☆14May 30, 2018Updated 7 years ago
- Example detection of compromise credentials in AWS☆122Aug 6, 2018Updated 7 years ago
- Real-time websocket stream of GPS events on a fancy SVG world map☆19Jan 5, 2022Updated 4 years ago
- ☆16Apr 13, 2025Updated 10 months ago
- Censors or hides shell / Bash / console output based on defined patterns - great for hiding secrets in demos!☆41Apr 22, 2021Updated 4 years ago
- Slackware scripts for things I like☆10Sep 20, 2016Updated 9 years ago
- An AWS lambda function that grantsss S3 permissionsss at ssscale.☆14Jan 4, 2018Updated 8 years ago
- NIST OSCAL SDK and CLI☆39Apr 28, 2020Updated 5 years ago
- The SSH Multiplex Backdoor Tool☆65Oct 21, 2019Updated 6 years ago
- This is the public security policy of CISOfy, with extra resources like security tools.☆93May 14, 2020Updated 5 years ago
- Locust.io Kubernetes Operator☆15Dec 2, 2020Updated 5 years ago
- AWS Metadata Proxy for protection against SSRF☆68Mar 3, 2020Updated 5 years ago
- Code and result files (models, etc.) related to Metadata Digger's parts using Artificial Intelligence methods.☆12Feb 4, 2020Updated 6 years ago
- 📝 bmfzf lets you fuzzy search of Chrome Bookmarks.☆15Apr 3, 2025Updated 10 months ago
- Aardvark is a multi-account AWS IAM Access Advisor API☆483Oct 25, 2024Updated last year
- Generic docker image builds☆16Updated this week
- (DEPRECATED) Diffy is a triage tool used during cloud-centric security incidents, to help digital forensics and incident response (DFIR)…☆631Jan 11, 2024Updated 2 years ago
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- A repository for personal information data patterns and detection for EU member states. These will be useful to understand how to best de…☆13Jul 10, 2018Updated 7 years ago
- monner☆269Oct 23, 2020Updated 5 years ago
- ☆17Jul 10, 2024Updated last year
- Web based analysis platform for use with the AWS_IR command line tool.☆17Aug 4, 2016Updated 9 years ago
- TrustZone Trusted Application 0-Days by Design☆25May 9, 2025Updated 9 months ago
- ☆29Jul 24, 2025Updated 6 months ago
- Proof of concept exploit about OpenSSL signature_algorithms_cert DoS flaw (CVE-2020-1967)☆20Jun 16, 2024Updated last year
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Apr 29, 2017Updated 8 years ago
- PROJECT DELTA: SDN SECURITY EVALUATION FRAMEWORK☆223Apr 15, 2019Updated 6 years ago
- Route53/CloudFront Vulnerability Assessment Utility☆87Sep 11, 2023Updated 2 years ago
- ☆83Dec 5, 2019Updated 6 years ago