Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.
☆23Aug 30, 2024Updated last year
Alternatives and similar repositories for encap-attack
Users that are interested in encap-attack are comparing it to the libraries listed below
Sorting:
- ☆18Jul 30, 2024Updated last year
- ☆29May 12, 2025Updated 9 months ago
- Security Alert Decoration☆27Jul 21, 2025Updated 7 months ago
- Public repository to provide guidance and examples for people to start learning IaC. This repository also contains some open-hack style l…☆23Jun 14, 2023Updated 2 years ago
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆39Sep 25, 2024Updated last year
- Java archive implant toolkit.☆61Apr 20, 2025Updated 10 months ago
- ☆25Jun 27, 2024Updated last year
- ☆40Nov 29, 2024Updated last year
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆49Dec 29, 2023Updated 2 years ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Dec 12, 2023Updated 2 years ago
- ☆29Dec 26, 2025Updated 2 months ago
- vBrowser is a secure, containerized browser platform designed for covert web investigations. Originally created to support deep and dark …☆20Jan 11, 2026Updated last month
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 10 months ago
- Azure Activity Log Axe is a continually developing tool that simplifies the transactional log format provided by Microsoft. The tool leve…☆35Sep 6, 2024Updated last year
- Kubernetes audit logging, when you don't control the control plane☆91Updated this week
- Dont Gamble with Risk☆14Mar 4, 2024Updated last year
- ☆14Jan 8, 2026Updated last month
- Dataset fingerprinting for AIBOM☆15Feb 18, 2026Updated last week
- This application was built to help reduce the amount of time it takes to review AWS Lambda code.☆61Nov 11, 2024Updated last year
- Deliberately vulnerable AWS resources for security assessment demos☆32Aug 20, 2022Updated 3 years ago
- AWS honey token manager☆89Aug 1, 2024Updated last year
- Easily generate reproducible infrastructure☆40Dec 3, 2025Updated 2 months ago
- Modular web-application honeypot platform built using go and gin☆63May 8, 2024Updated last year
- This is a custom SSM agent which is sorta functional☆17Jul 5, 2021Updated 4 years ago
- Listing of resources for example AWS Service Control Policies (SCPs)☆17Jan 10, 2024Updated 2 years ago
- Exit if environment variables known to be used as access tokens are set.☆15May 30, 2022Updated 3 years ago
- A tool that allows downloading S3 directories as ZIP files☆34Apr 28, 2023Updated 2 years ago
- Scans tcl for command injection☆36May 24, 2019Updated 6 years ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆112Jan 2, 2025Updated last year
- Repository to archive GCP Documentation for local use☆16Feb 11, 2025Updated last year
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆59Sep 20, 2023Updated 2 years ago
- Rules shared by the community from 100 Days of YARA 2025☆38Jan 2, 2026Updated last month
- This repository contains an IDA processor for loading and disassembling compiled yara rules.☆44Dec 31, 2024Updated last year
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆113Nov 13, 2024Updated last year
- ☆15Mar 31, 2023Updated 2 years ago
- Go library for mapping IP address ranges to cloud provider regions (currently: AWS and GCP)☆22Updated this week
- ☆21Apr 17, 2023Updated 2 years ago
- Compares and analyzes GCP IAM roles.☆78Mar 9, 2025Updated 11 months ago
- A Golang program to rotate AWS & GCP account keys☆67May 12, 2025Updated 9 months ago