allisonis / gcp-iam-sentinel-examplesView external linksLinks
☆28Aug 6, 2020Updated 5 years ago
Alternatives and similar repositories for gcp-iam-sentinel-examples
Users that are interested in gcp-iam-sentinel-examples are comparing it to the libraries listed below
Sorting:
- These are tools we released with our 2020 defcon/blackhat talk https://www.youtube.com/watch?v=Ml09R38jpok☆172Feb 6, 2025Updated last year
- This repo gives an overview of some GCP metadata API attack and defend patterns☆78Mar 23, 2020Updated 5 years ago
- Automated GKE Kubelet Impersonation and Cluster Secret Stealer via kube-env☆102Sep 10, 2019Updated 6 years ago
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- A quick and dirty Golang security talk☆27Apr 23, 2020Updated 5 years ago
- This is a custom SSM agent which is sorta functional☆17Jul 5, 2021Updated 4 years ago
- ☆18Jul 30, 2024Updated last year
- A tool for analyzing the attack surface of an application☆19Mar 5, 2025Updated 11 months ago
- Advanced Shodan-based scanner for discovering, verifying, and enumerating Model Context Protocol (MCP) servers and AI infrastructure tool…☆33Jan 3, 2026Updated last month
- A meta-database collecting resources that compile lists of breaches☆21Oct 30, 2025Updated 3 months ago
- An interactive way to learn threat modeling☆17Feb 14, 2019Updated 7 years ago
- Performing secure code review with LLMs (and vibe coding IDEs)☆36Aug 5, 2025Updated 6 months ago
- Ransomware base in Java for all operating systems☆19Jun 13, 2017Updated 8 years ago
- ☆20Dec 23, 2021Updated 4 years ago
- Hayat is a script for report and analyze Google Cloud Platform resources.☆81Jan 7, 2020Updated 6 years ago
- Javascript Code Injection for Debugging☆20Nov 11, 2023Updated 2 years ago
- Utility for downloading and mounting EBS snapshots using the EBS Direct API's☆91Mar 17, 2025Updated 10 months ago
- ☆21Sep 25, 2018Updated 7 years ago
- A red team emulation tool deveoped by CyCraft Technology☆25Apr 18, 2024Updated last year
- Python script for collecting and visualising Google Cloud Platform IAM permissions☆51Apr 23, 2017Updated 8 years ago
- Vendor Security Model Contract☆97Jul 3, 2022Updated 3 years ago
- CVE database☆21Sep 2, 2020Updated 5 years ago
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆55Dec 9, 2025Updated 2 months ago
- UI für verschiedene Reifegrad-Dimensionen☆32Dec 10, 2022Updated 3 years ago
- A beginner-friendly CTF about Kubernetes security.☆81Aug 9, 2022Updated 3 years ago
- A library to assist in security-testing Unicode enabled applications during fuzzing, XSS, SQLi, etc.☆42Jul 1, 2017Updated 8 years ago
- Equal Experts Secure Delivery Playbook☆26Feb 21, 2023Updated 2 years ago
- Golang command line tool for the macOS Endpoint Security Framework☆29Nov 25, 2019Updated 6 years ago
- Demonstrates how a malicious dependency could negatively impact the build output.☆25Aug 11, 2023Updated 2 years ago
- AWS Metadata Proxy for protection against SSRF☆68Mar 3, 2020Updated 5 years ago
- GitHub Actions Cache Native Malware - for Educational and Research Purposes only.☆92Jan 28, 2026Updated 2 weeks ago
- ☆27Oct 1, 2025Updated 4 months ago
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆29Aug 18, 2019Updated 6 years ago
- Ansible role to install Cobalt Strike and optionally configure as Teamserver☆33Mar 17, 2021Updated 4 years ago
- Pentester-focused Docker registry tool to enumerate and pull images☆36Oct 19, 2025Updated 3 months ago
- Tooling and library for generation, validation and verification of supply chain metadata documents and frameworks☆33Apr 22, 2025Updated 9 months ago
- A set of vulnerable Golang programs☆179Jul 5, 2023Updated 2 years ago
- ☆34Feb 10, 2023Updated 3 years ago
- ☆65May 21, 2024Updated last year