Analyze assets authorization, who has access to what and how
☆76Mar 30, 2026Updated last month
Alternatives and similar repositories for universal-data-permissions-scanner
Users that are interested in universal-data-permissions-scanner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Meeting materials☆24May 11, 2026Updated last week
- Machine-readable .txt blocklist of scam URLs and IP Addresses from the Global Anti Scam Organization (https://www.globalantiscam.org) web…☆34Apr 21, 2026Updated 3 weeks ago
- Speaker content from NIC2018☆18Feb 20, 2018Updated 8 years ago
- TRC20 Wallet Listen Events☆11Aug 30, 2023Updated 2 years ago
- Tools and blogs I use to perform GCP red teams☆142Jul 23, 2024Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- AWS SSO Reporter☆55May 7, 2025Updated last year
- Browser extension for launching multi-platform OSINT queries from grouped YAML profiles.☆10Apr 25, 2025Updated last year
- CLI-based 802.11 Rogue (Fake) AP & Hidden AP Spotter☆14Dec 26, 2025Updated 4 months ago
- A simple bash script for Web Cache Deception exploitation.☆16Oct 7, 2024Updated last year
- Speaker content from NIC2017☆18Mar 22, 2017Updated 9 years ago
- Example implementations of the universal helm charts☆18Jan 19, 2023Updated 3 years ago
- Parsing Module of Microsoft SQL Server Transaction log☆12May 12, 2023Updated 3 years ago
- This is a sample solution that demonstrates how to use AWS IAM Identity Center with Neptune to visualize and map relationships between id…☆35Nov 27, 2025Updated 5 months ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆11Oct 6, 2020Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- PowerShell provider for Dropbox☆12Mar 8, 2018Updated 8 years ago
- Threatfox Censys is a tool to query Censys Search for IP addresses and domains and then parses the JSON and submits the results to Threat…☆39Mar 30, 2026Updated last month
- Alex Verboon PowerShell Code☆40May 21, 2020Updated 5 years ago
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Jun 14, 2024Updated last year
- ☆45May 9, 2023Updated 3 years ago
- Dump LSASS process in Task Manager without triggering Defender.☆18Apr 6, 2023Updated 3 years ago
- OpenID Shared Signals and Events (SSE) / Continuous Access Evaluation Protocol (CAEP) / Risk Incident Sharing and Coordination (RISC) JSO…☆15Jun 7, 2024Updated last year
- Documentation for DFIR ORC, artefact collection tool dedicated to Microsoft Windows☆12May 4, 2026Updated 2 weeks ago
- Coalfire GCP RAMP/pak Reference Architecture☆13Mar 27, 2026Updated last month
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Apple BLE proximity pairing message spoofing☆13Oct 8, 2023Updated 2 years ago
- ☆85Nov 14, 2025Updated 6 months ago
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆44May 8, 2026Updated last week
- Python Module for parsing Apple ASL Logs☆15Apr 7, 2016Updated 10 years ago
- WhatHitMe is a Python3 tool which provides the possible Groups and their attributed Campaigns that may have attacked you in an incident, …☆18Jun 29, 2023Updated 2 years ago
- Effortlessly browse and manage your files with ease using Tiny File Manager [WH1Z-Edition], a compact single-file PHP file manager.☆25Feb 13, 2024Updated 2 years ago
- the venom framework is a framework made in ruby filled with tools for wireless hacking, normal terminal commands, metasploit payloads and…☆19Jun 6, 2019Updated 6 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆19Oct 8, 2020Updated 5 years ago
- ☆22Jul 30, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Kontalk Public Network☆16Sep 5, 2018Updated 7 years ago
- XlsToEf is a library you can use to help you import rows from excel files and then save right to the database with Entity Framework.☆10Dec 10, 2022Updated 3 years ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆50May 8, 2024Updated 2 years ago
- A simple application to keep on an eye on the availability of HTTP sites☆15Oct 10, 2023Updated 2 years ago
- Hacker-cam☆16Aug 17, 2022Updated 3 years ago
- Dynamically Compiled O2 Scripts Folder☆19Mar 7, 2016Updated 10 years ago
- Offensive Data Storage☆61Sep 1, 2016Updated 9 years ago