Netflix / sleepy-puppy-docker
sleepy puppy docker setup
☆45Updated 6 years ago
Alternatives and similar repositories for sleepy-puppy-docker:
Users that are interested in sleepy-puppy-docker are comparing it to the libraries listed below
- INACTIVE - Security Testing Tool☆106Updated 8 years ago
- AWS EC2 and S3 Security Auditing Tool☆41Updated 10 years ago
- Auditing & Hardening script for Kubernetes☆45Updated 6 years ago
- 🔐 A concurrent, command-line AWS S3 Fuzzer. Written in Go.☆45Updated 7 years ago
- Portcullis Computer Security Co-ordinated Disclosure Toolkit☆24Updated 4 years ago
- Hardening and Auditing Tool For Docker Hosts & Containers☆68Updated 9 years ago
- badbucket checks your s3 bucket for common misconfigurations☆23Updated 7 years ago
- drydock provides a flexible way of assessing the security of your Docker daemon configuration and containers using editable audit templat…☆65Updated 8 years ago
- An actuary is a business professional who analyzes the financial consequences of risk.☆78Updated 7 years ago
- ☆14Updated 7 years ago
- Repository for Security Workshop content☆20Updated 7 years ago
- A Docker container for Cowrie - SSH honeypot based on kippo☆10Updated 9 years ago
- CVE feed synchronization to issue management system☆58Updated 10 years ago
- ☆11Updated 6 years ago
- Ansible Provisioned Security Testing Platform☆17Updated 8 years ago
- Exfiltrate files via DNS☆96Updated 11 years ago
- ☆79Updated 9 years ago
- ☆32Updated 10 years ago
- A tool for discovering subdomains via third party services and wordlists.☆75Updated 8 years ago
- Community rules for Commit Watcher☆24Updated 8 years ago
- Use burp's JS static code analysis on code from your local system.☆42Updated 8 years ago
- INACTIVE - http://mzl.la/ghe-archive - Unit Tests for your Network -☆44Updated 5 years ago
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 9 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- DEPRECATED - Propagate users from Mozilla's Person API to third party systems.☆40Updated 2 years ago
- A tool for calculating necessary SQL Server permissions☆24Updated 10 years ago
- AWS risky security change detector based on EDDA.☆82Updated 6 years ago
- INACTIVE - http://mzl.la/ghe-archive - Minion Backend☆41Updated 5 years ago
- Simple (web-) application vulnerability management system☆21Updated 10 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Updated 9 years ago