ancat / egretsLinks
egrets monitors egress
☆46Updated 5 years ago
Alternatives and similar repositories for egrets
Users that are interested in egrets are comparing it to the libraries listed below
Sorting:
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Updated 3 years ago
- Going Florida on container keyring masks. A tool to demonstrate the ineffectivity containers have on isolating Linux Kernel keyrings.☆43Updated last year
- ☆88Updated 10 months ago
- Exploit CVE-2021-25735: Kubernetes Validating Admission Webhook Bypass☆17Updated 4 years ago
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target container☆106Updated 6 years ago
- ☆11Updated 4 months ago
- CERTITUDE - A python package to classify malicious URLs☆20Updated 3 years ago
- Kubernetes Unhinged Shell 😎☆45Updated 2 years ago
- ☆27Updated 2 weeks ago
- K8s API Honeypot with Active Defense Capabilities☆40Updated last year
- Container for assorted volatility plugins.☆22Updated 11 years ago
- AWS EKS Cluster Forensics☆23Updated 3 years ago
- Red team tool that emulates the SolarWinds CI compromise attack vector.☆24Updated last year
- A repository to store Rad Fingerprinting data.☆24Updated 9 months ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆28Updated 3 months ago
- Adversary emulation for EDR/SIEM testing (macOS/Linux)☆43Updated last year
- The Jolly Executioner - a simple command execution proxy☆16Updated 11 months ago
- Kubernetes offensive framework built in eBPF☆37Updated 2 years ago
- Provide a shell like interface by utilizing osquery's distributed API☆81Updated 4 years ago
- Serverless, real-time, ClamAV+Yara scanning for your S3 Buckets☆31Updated last year
- A simple binary wrapper for DNS canarytokens.☆25Updated 2 years ago
- Open Source runtime tool which help to detect malware code execution and run time mis-configuration change on a kubernetes cluster☆36Updated 3 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Updated last year
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Updated 5 years ago
- Modron - Cloud security compliance☆33Updated 5 months ago
- Fun tools around the EBS Direct API☆18Updated 4 years ago
- Execute tasks across SSH hosts using random selection☆17Updated 5 years ago
- SysFlow documentation and issues tracker☆46Updated 8 months ago
- An eBPF detection program for CVE-2022-0847☆28Updated 2 years ago
- Hosted analyzers built for Grapl☆13Updated 2 years ago