artemnikitin / vulnedock
Proof of concept for vulnerability management of Docker containers
☆16Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for vulnedock
- 🔐 A concurrent, command-line AWS S3 Fuzzer. Written in Go.☆44Updated 7 years ago
- A Docker container for Cowrie - SSH honeypot based on kippo☆10Updated 9 years ago
- An example of a vulnerable slack bot that runs in AWS lambda.☆19Updated 7 years ago
- ☆11Updated 6 years ago
- badbucket checks your s3 bucket for common misconfigurations☆23Updated 7 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆31Updated last month
- Auditing & Hardening script for Kubernetes☆45Updated 6 years ago
- A gitbook for doing a null Bangalore session on linux container security to discuss and teach namespaces, cgroups etc.☆20Updated 7 years ago
- Looks for GitHub org users without 2FA turned on☆9Updated 8 years ago
- Custom slash command to do ipinfo.io lookups from within Slack☆10Updated 8 years ago
- 🌌 Go-Observe: A command line Mozilla Observatory client written in Go☆12Updated 7 years ago
- A simple ssh private key password recovery tool written in Go☆22Updated 11 months ago
- A tool for calculating necessary SQL Server permissions☆23Updated 9 years ago
- automatic enumeration and maintenance of Suricata monitoring interfaces☆11Updated 4 years ago
- Flame - Send vulnerabilities reports to SIEM☆15Updated 8 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Updated 7 years ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Updated 5 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Updated 8 years ago
- A Scaleable and Asynchronous Framework for Testing Tools built on Kubernetes☆35Updated 7 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 8 years ago
- Conference talk slides and code☆11Updated 4 years ago
- Launchd daemon that reports major OSX modifications through growl☆16Updated 9 years ago
- Expand CIDRs or wrangle a list of IPs back to its smallest CIDR blocks possible☆10Updated 4 years ago
- Various blog post projects.☆10Updated 5 months ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 7 years ago
- all things awesome security☆12Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago