ancat / egretsLinks
egrets monitors egress
☆46Updated 5 years ago
Alternatives and similar repositories for egrets
Users that are interested in egrets are comparing it to the libraries listed below
Sorting:
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Updated 3 years ago
- rxtls is a hyper-optimized, per-core Certificate Transparency (CT) log processor built for one purpose: to extract and process 100,000+ X…☆34Updated 2 weeks ago
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target container☆106Updated 6 years ago
- Going Florida on container keyring masks. A tool to demonstrate the ineffectivity containers have on isolating Linux Kernel keyrings.☆43Updated 2 years ago
- Exploit CVE-2021-25735: Kubernetes Validating Admission Webhook Bypass☆17Updated 4 years ago
- Provide a shell like interface by utilizing osquery's distributed API☆81Updated 5 years ago
- Kubernetes Unhinged Shell 😎☆46Updated 2 years ago
- ☆27Updated last month
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated 2 years ago
- ☆88Updated last year
- Whitelisting LD_PRELOAD libraries using LD_AUDIT☆63Updated 3 years ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆28Updated 4 months ago
- ☆11Updated 5 months ago
- CERTITUDE - A python package to classify malicious URLs☆20Updated 3 years ago
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Updated 5 years ago
- Docker Secure Computing Profile Generator☆48Updated 3 years ago
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆56Updated 7 months ago
- Visualize your Terraform files☆34Updated 4 years ago
- Open Source runtime tool which help to detect malware code execution and run time mis-configuration change on a kubernetes cluster☆36Updated 3 years ago
- AWS EKS Cluster Forensics☆23Updated 3 years ago
- DIT is a DTLS MitM proxy implemented in Python 3. It can intercept, manipulate and suppress datagrams between two DTLS endpoints and supp…☆58Updated 3 years ago
- ☆29Updated 5 months ago
- Salesforce Policy Deviation Checker☆30Updated 4 years ago
- A Security Scanner for Go☆26Updated 6 years ago
- Tool to examine the behaviour of setuid binaries under constrained limits.☆61Updated 4 years ago
- An eBPF detection program for CVE-2022-0847☆28Updated 3 years ago
- Fun tools around the EBS Direct API☆18Updated 4 years ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 3 years ago
- K8s API Honeypot with Active Defense Capabilities☆40Updated last year
- A simple binary wrapper for DNS canarytokens.☆25Updated 2 years ago