chen-keinan / mesh-kridikLinks
mesh-kridik is an open-source security checker that performs various security checks on a Kubernetes cluster with istio service mesh and is leveraged by OPA (Open Policy Agent) to enforce security rules.
☆26Updated 6 months ago
Alternatives and similar repositories for mesh-kridik
Users that are interested in mesh-kridik are comparing it to the libraries listed below
Sorting:
- Docker image for reconftw, a simple script intended to perform a full recon on an objective with multiple subdomains☆10Updated 4 years ago
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- A wrapper around ripgrep to check for various common patterns.☆13Updated 5 years ago
- Exploit for win10 SMB3.1☆17Updated 5 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- A basic proxylogon scanner☆27Updated 3 years ago
- A Canary which fires when uninstalled☆34Updated 4 years ago
- Docker container for running OWASP WebGoat.NET application☆11Updated 7 years ago
- ☆12Updated last year
- Tool for reconnaissance of AWS cloud environments☆13Updated last year
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service and versions.☆16Updated 5 months ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Updated last year
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- Simple utility to manage multiple ssh☆15Updated 2 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- FACT is a tool to collect, process and visualise forensic data from clusters of machines running in the cloud or on-premise.☆18Updated 9 months ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆21Updated 3 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆12Updated 3 years ago
- ☆16Updated 4 months ago
- Log4j-Scanner with Bind-Receipt and custom hostnames☆18Updated 3 years ago
- ☆10Updated 4 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 5 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- ☆14Updated 3 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Updated 4 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 5 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21Updated 8 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆59Updated last year
- Do the unexpected with AD GPO processing☆9Updated 6 years ago
- CVE-2020-28243 Local Privledge Escalation Exploit in SaltStack Minion☆17Updated 4 years ago