GCP and GSUITE security auditing scripts
☆27Apr 29, 2024Updated last year
Alternatives and similar repositories for Cloud-Security
Users that are interested in Cloud-Security are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆10Apr 11, 2020Updated 5 years ago
- This sprint describes strategies to deploying web and other software, plus a lesson in using GCP to build continuous deployment.☆11Dec 23, 2017Updated 8 years ago
- Application whitelisting/blacklisting & end-user notifications for GSuite☆14Apr 19, 2018Updated 7 years ago
- This repository provides simple way to monitor GPU utilization on GCP☆14May 10, 2021Updated 4 years ago
- Tool searching for different default passwords.☆16Jan 27, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Confluence Widget Connector path traversal (CVE-2019-3396)☆22Oct 4, 2019Updated 6 years ago
- Ansible GCP Demo☆16Jan 29, 2019Updated 7 years ago
- Splunk TA for alert action to TheHive-project☆11May 13, 2020Updated 5 years ago
- A curated list of awesome things related to TheHive & Cortex☆185Oct 9, 2021Updated 4 years ago
- Utility for binary searching a sorted file for lines that start with the search key☆18Jun 9, 2018Updated 7 years ago
- Google Cloud Platform Security Tool☆235Jul 30, 2019Updated 6 years ago
- The Greenbone Vulnerability Management (GVM) and OpenVAS Scanner for Docker!☆24May 25, 2022Updated 3 years ago
- Python script for collecting and visualising Google Cloud Platform IAM permissions☆51Apr 23, 2017Updated 8 years ago
- WigleAPI-JSON in PHP with JSON Response☆14Nov 18, 2013Updated 12 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Creates secured box for accessing internal networks☆14Apr 5, 2019Updated 6 years ago
- Binary Ninja Posters☆35Oct 14, 2020Updated 5 years ago
- These books are pulled from # List of Free Learning Resources [ exploit☆16Feb 9, 2018Updated 8 years ago
- Small snippets of code we often find useful☆11Nov 9, 2019Updated 6 years ago
- A better dns bruteforcer written in golang☆13Nov 4, 2018Updated 7 years ago
- osquery input plugin☆10Oct 23, 2018Updated 7 years ago
- A playground to practice SSRF Attacks against web apps☆17Oct 15, 2018Updated 7 years ago
- A template for generating Linux AppImage projects with Briefcase☆21Mar 9, 2026Updated 2 weeks ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Get tweets and save file in JSON format without Twitter API☆11Jan 1, 2019Updated 7 years ago
- Build locally, deploy to any cloud, Automate all configurations...☆17Mar 25, 2020Updated 6 years ago
- Repo for my scripts that I've made for work done, not all are functional, some are abandoned or WIP.☆10Jan 9, 2026Updated 2 months ago
- python exploit for werkzeug debug shell command execution☆10Jun 26, 2017Updated 8 years ago
- Real-time chat without using Javascript.☆18Feb 7, 2018Updated 8 years ago
- VMC: a Scalable, Open Source and Free Vulnerability Management Platform☆16Dec 22, 2024Updated last year
- Scan and categorize websites for rapid triage☆12Jun 23, 2022Updated 3 years ago