☆28Aug 6, 2020Updated 5 years ago
Alternatives and similar repositories for gcp-iam-sentinel-examples
Users that are interested in gcp-iam-sentinel-examples are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- These are tools we released with our 2020 defcon/blackhat talk https://www.youtube.com/watch?v=Ml09R38jpok☆174Feb 6, 2025Updated last year
- This repo gives an overview of some GCP metadata API attack and defend patterns☆78Mar 23, 2020Updated 6 years ago
- Automated GKE Kubelet Impersonation and Cluster Secret Stealer via kube-env☆102Sep 10, 2019Updated 6 years ago
- Golang command line tool for the macOS Endpoint Security Framework☆29Nov 25, 2019Updated 6 years ago
- A Go library for using ApproveAPI☆16May 12, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Darkfiles finds orphaned files in container images and makes them to bad deeds☆43May 11, 2023Updated 2 years ago
- ☆18Jul 30, 2024Updated last year
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- Find-and-replace patterns for the Go language.☆10Sep 24, 2022Updated 3 years ago
- Performing secure code review with LLMs (and vibe coding IDEs)☆41Aug 5, 2025Updated 9 months ago
- Content for Linkerd workshops☆13Oct 30, 2024Updated last year
- Python script for collecting and visualising Google Cloud Platform IAM permissions☆51Apr 23, 2017Updated 9 years ago
- Demos of Cilium☆11Mar 20, 2024Updated 2 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- This is a custom SSM agent which is sorta functional☆17Jul 5, 2021Updated 4 years ago
- Invanti VPN Vulnerabilities for Jan - Feb 2024 - Links to Keep it all Organized☆16Feb 15, 2024Updated 2 years ago
- Advanced Shodan-based scanner for discovering, verifying, and enumerating Model Context Protocol (MCP) servers and AI infrastructure tool…☆45Mar 31, 2026Updated last month
- A repository to store Rad Fingerprinting data.☆24Aug 1, 2024Updated last year
- A tool for secrets management, encryption as a service, and privileged access management☆12Jul 17, 2025Updated 9 months ago
- ☆25May 13, 2019Updated 6 years ago
- Network Defender Toolkit☆18Jun 11, 2013Updated 12 years ago
- apkfram was written in order to help any mobile penetration testers to identify the Framework used to develop the Android application.☆12Oct 9, 2024Updated last year
- CrowdStrike Falcon log forwarder from falcon S3 bucket to your S3 bucket☆11Apr 15, 2021Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- 10 Gbit/s flexible and extensible Ethernet FPGA-based traffic generator☆11Oct 3, 2014Updated 11 years ago
- Utility for downloading and mounting EBS snapshots using the EBS Direct API's☆93Mar 17, 2025Updated last year
- A tool for analyzing the attack surface of an application☆19Mar 5, 2025Updated last year
- Javascript Code Injection for Debugging☆21Nov 11, 2023Updated 2 years ago
- An efficient algorithm for k-bounded (Damerau-)Levenshtein distance☆16Oct 13, 2018Updated 7 years ago
- An interactive way to learn threat modeling☆17Feb 14, 2019Updated 7 years ago
- Vendor Security Model Contract☆96Jul 3, 2022Updated 3 years ago
- Runtime enforcement of software supply chain capabilities in Go☆19Nov 12, 2025Updated 5 months ago
- Ransomware base in Java for all operating systems☆19Jun 13, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Data about all known supply-chain attacks through history☆66May 28, 2025Updated 11 months ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Mar 1, 2021Updated 5 years ago
- AWS Metadata Proxy for protection against SSRF☆68Mar 3, 2020Updated 6 years ago
- ☆35Feb 10, 2023Updated 3 years ago
- Source for k8siuse, a site in the style of caniuse that visualizes GVKs and their fields over different versions of the Kubernetes API☆14Dec 6, 2022Updated 3 years ago
- A meta-database collecting resources that compile lists of breaches☆22Oct 30, 2025Updated 6 months ago
- An example Windows 10 UMDF driver for the sole purpose of sending MMIO to BAR regions of an FPGA☆21May 4, 2018Updated 8 years ago