☆28Aug 6, 2020Updated 5 years ago
Alternatives and similar repositories for gcp-iam-sentinel-examples
Users that are interested in gcp-iam-sentinel-examples are comparing it to the libraries listed below
Sorting:
- These are tools we released with our 2020 defcon/blackhat talk https://www.youtube.com/watch?v=Ml09R38jpok☆173Feb 6, 2025Updated last year
- This repo gives an overview of some GCP metadata API attack and defend patterns☆79Mar 23, 2020Updated 5 years ago
- Automated GKE Kubelet Impersonation and Cluster Secret Stealer via kube-env☆102Sep 10, 2019Updated 6 years ago
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- A quick and dirty Golang security talk☆27Apr 23, 2020Updated 5 years ago
- This is a custom SSM agent which is sorta functional☆17Jul 5, 2021Updated 4 years ago
- ☆18Jul 30, 2024Updated last year
- A tool for analyzing the attack surface of an application☆19Mar 5, 2025Updated last year
- ☆14Apr 23, 2019Updated 6 years ago
- An interactive way to learn threat modeling☆17Feb 14, 2019Updated 7 years ago
- Performing secure code review with LLMs (and vibe coding IDEs)☆36Aug 5, 2025Updated 7 months ago
- A meta-database collecting resources that compile lists of breaches☆21Oct 30, 2025Updated 4 months ago
- ☆20Dec 23, 2021Updated 4 years ago
- CVE-2020-8103 Link Resolution Privilege Escalation Vulnerability in Bitdefender Antivirus Free☆16Jun 8, 2020Updated 5 years ago
- Ransomware base in Java for all operating systems☆19Jun 13, 2017Updated 8 years ago
- Hayat is a script for report and analyze Google Cloud Platform resources.☆80Jan 7, 2020Updated 6 years ago
- Javascript Code Injection for Debugging☆20Nov 11, 2023Updated 2 years ago
- A collection of models for organizing, prioritizing, and understanding cybersecurity and information risk management concepts.☆25Oct 3, 2024Updated last year
- Utility for downloading and mounting EBS snapshots using the EBS Direct API's☆91Mar 17, 2025Updated 11 months ago
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behavior☆38Feb 16, 2026Updated 3 weeks ago
- A red team emulation tool deveoped by CyCraft Technology☆25Apr 18, 2024Updated last year
- Python script for collecting and visualising Google Cloud Platform IAM permissions☆51Apr 23, 2017Updated 8 years ago
- Vendor Security Model Contract☆97Jul 3, 2022Updated 3 years ago
- A repository to store Rad Fingerprinting data.☆24Aug 1, 2024Updated last year
- Equal Experts Secure Delivery Playbook☆26Feb 21, 2023Updated 3 years ago
- Demonstrates how a malicious dependency could negatively impact the build output.☆25Aug 11, 2023Updated 2 years ago
- A beginner-friendly CTF about Kubernetes security.☆81Aug 9, 2022Updated 3 years ago
- A library to assist in security-testing Unicode enabled applications during fuzzing, XSS, SQLi, etc.☆42Jul 1, 2017Updated 8 years ago
- AWS Metadata Proxy for protection against SSRF☆68Mar 3, 2020Updated 6 years ago
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆29Aug 18, 2019Updated 6 years ago
- ☆27Feb 19, 2026Updated 2 weeks ago
- Tooling and library for generation, validation and verification of supply chain metadata documents and frameworks☆33Apr 22, 2025Updated 10 months ago
- A set of vulnerable Golang programs☆179Jul 5, 2023Updated 2 years ago
- ☆35Feb 10, 2023Updated 3 years ago
- ☆65May 21, 2024Updated last year
- Compares and analyzes GCP IAM roles.☆78Mar 9, 2025Updated last year
- GitHub Actions Cache Native Malware - for Educational and Research Purposes only.☆103Jan 28, 2026Updated last month
- A simple Meterpreter stager written in Rust.☆45Nov 2, 2025Updated 4 months ago
- MCP Snitch is a macOS application that intercepts and monitors MCP server communications, providing security analysis, access control, an…☆93Oct 14, 2025Updated 4 months ago